General
-
Target
a8b65a49ad17d770535d8da19df62ffe8b4215b8dd41ef324d37122f3dc85bc3
-
Size
479KB
-
Sample
241029-pg1hdavglp
-
MD5
09f057852c8747624931134e6bef92b6
-
SHA1
646d228a368105af06a68384d89022f9af3bfbb3
-
SHA256
a8b65a49ad17d770535d8da19df62ffe8b4215b8dd41ef324d37122f3dc85bc3
-
SHA512
ffcade3080b009f2d097ad7ea7660e4cb956d39f9fd153dabe55ffb52e1270a6a6c817662827114a8aaf1c8072b9ebc0cabbf353e8aba637babac2a5787f5355
-
SSDEEP
6144:KRy+bnr+0p0yN90QEtlXO3/CUJlEY5zbPsTmJTZeh1WhzHiuJs86UMUCJYgnY1l:3Mroy90tOvCUJb5zIgTI1qJIUMhyoYT
Static task
static1
Behavioral task
behavioral1
Sample
a8b65a49ad17d770535d8da19df62ffe8b4215b8dd41ef324d37122f3dc85bc3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8b65a49ad17d770535d8da19df62ffe8b4215b8dd41ef324d37122f3dc85bc3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
a8b65a49ad17d770535d8da19df62ffe8b4215b8dd41ef324d37122f3dc85bc3.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
a8b65a49ad17d770535d8da19df62ffe8b4215b8dd41ef324d37122f3dc85bc3.exe
Resource
win11-20241023-en
Malware Config
Targets
-
-
Target
a8b65a49ad17d770535d8da19df62ffe8b4215b8dd41ef324d37122f3dc85bc3
-
Size
479KB
-
MD5
09f057852c8747624931134e6bef92b6
-
SHA1
646d228a368105af06a68384d89022f9af3bfbb3
-
SHA256
a8b65a49ad17d770535d8da19df62ffe8b4215b8dd41ef324d37122f3dc85bc3
-
SHA512
ffcade3080b009f2d097ad7ea7660e4cb956d39f9fd153dabe55ffb52e1270a6a6c817662827114a8aaf1c8072b9ebc0cabbf353e8aba637babac2a5787f5355
-
SSDEEP
6144:KRy+bnr+0p0yN90QEtlXO3/CUJlEY5zbPsTmJTZeh1WhzHiuJs86UMUCJYgnY1l:3Mroy90tOvCUJb5zIgTI1qJIUMhyoYT
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1