General
-
Target
82a1800ccb474d89f73f0be392105bc6c7cbc7890c8176629b40aac9d7e58ac0
-
Size
1.0MB
-
Sample
241030-1jffrszqhy
-
MD5
f37adf558ea4c7dc2b619c77fdb38709
-
SHA1
3f9d03ab3971aa3595af4b87ad339ea69e5cb0a6
-
SHA256
82a1800ccb474d89f73f0be392105bc6c7cbc7890c8176629b40aac9d7e58ac0
-
SHA512
ad8524a02a0f3ff96d472c620c420a72d67788f362d1195b62349f5d2d18bf4f40b4635cfddbf3051185edf5a5ee55ebedffb1dbd9fa81b9bb8d36d51c1471c0
-
SSDEEP
24576:MRBlpCnS/scHFiubIqtKXQiS8W0n3gtGO3QEM9p8:cIAs0FP3ad3UG7p
Static task
static1
Behavioral task
behavioral1
Sample
82a1800ccb474d89f73f0be392105bc6c7cbc7890c8176629b40aac9d7e58ac0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
82a1800ccb474d89f73f0be392105bc6c7cbc7890c8176629b40aac9d7e58ac0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
82a1800ccb474d89f73f0be392105bc6c7cbc7890c8176629b40aac9d7e58ac0
-
Size
1.0MB
-
MD5
f37adf558ea4c7dc2b619c77fdb38709
-
SHA1
3f9d03ab3971aa3595af4b87ad339ea69e5cb0a6
-
SHA256
82a1800ccb474d89f73f0be392105bc6c7cbc7890c8176629b40aac9d7e58ac0
-
SHA512
ad8524a02a0f3ff96d472c620c420a72d67788f362d1195b62349f5d2d18bf4f40b4635cfddbf3051185edf5a5ee55ebedffb1dbd9fa81b9bb8d36d51c1471c0
-
SSDEEP
24576:MRBlpCnS/scHFiubIqtKXQiS8W0n3gtGO3QEM9p8:cIAs0FP3ad3UG7p
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1