General
-
Target
77249b38a01fc1add2cf7a74e5a886791723c2f8940f9a88352f9a9af98197eb
-
Size
827KB
-
Sample
241029-pfv69swpaj
-
MD5
bef56394304d25a709fa8cd50e039943
-
SHA1
583f6e7d9c04d03c74690142d4b9298559205c83
-
SHA256
77249b38a01fc1add2cf7a74e5a886791723c2f8940f9a88352f9a9af98197eb
-
SHA512
4676583cba24fa470d333a0f52c2bb3c1f8883a581d593531810806e45ad68c60e58c1110a8cc2ce52b57fde3a51800b4180f328c4f8b973c15bd30f33a8bc99
-
SSDEEP
24576:SyVodE/R0ucUNWuObU5SdkxEYIayXM6wk:5V1/ZcUNW1U5Sdky9p
Static task
static1
Behavioral task
behavioral1
Sample
77249b38a01fc1add2cf7a74e5a886791723c2f8940f9a88352f9a9af98197eb.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
77249b38a01fc1add2cf7a74e5a886791723c2f8940f9a88352f9a9af98197eb
-
Size
827KB
-
MD5
bef56394304d25a709fa8cd50e039943
-
SHA1
583f6e7d9c04d03c74690142d4b9298559205c83
-
SHA256
77249b38a01fc1add2cf7a74e5a886791723c2f8940f9a88352f9a9af98197eb
-
SHA512
4676583cba24fa470d333a0f52c2bb3c1f8883a581d593531810806e45ad68c60e58c1110a8cc2ce52b57fde3a51800b4180f328c4f8b973c15bd30f33a8bc99
-
SSDEEP
24576:SyVodE/R0ucUNWuObU5SdkxEYIayXM6wk:5V1/ZcUNW1U5Sdky9p
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1