General
-
Target
095139ce50e6f02d69ed365b632bd91194fbfbc47d8daa4dbd34bd51e17bfbe2
-
Size
706KB
-
Sample
241030-1jkeqa1hpa
-
MD5
f7dee9ae3e91d49a87dbe61dd57c9019
-
SHA1
df81daf25e3bf00b585a6f05740ee7af41a28813
-
SHA256
095139ce50e6f02d69ed365b632bd91194fbfbc47d8daa4dbd34bd51e17bfbe2
-
SHA512
f974af20af7f094dc0ad781e77d4ef43e75b42be2850e1cc9c1bf7877014bf097151bb722947f6915ac73479fd133398274bf7c0ad50eeb53b92a52a4fa0b23c
-
SSDEEP
12288:gy90mzR9dUr8SMwFhu8DiXfx5GJVT08klB+1VgrniU/OTdmekKUpQD:gyF3UrRMOZz108gMU/wQen9D
Static task
static1
Behavioral task
behavioral1
Sample
095139ce50e6f02d69ed365b632bd91194fbfbc47d8daa4dbd34bd51e17bfbe2.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
095139ce50e6f02d69ed365b632bd91194fbfbc47d8daa4dbd34bd51e17bfbe2
-
Size
706KB
-
MD5
f7dee9ae3e91d49a87dbe61dd57c9019
-
SHA1
df81daf25e3bf00b585a6f05740ee7af41a28813
-
SHA256
095139ce50e6f02d69ed365b632bd91194fbfbc47d8daa4dbd34bd51e17bfbe2
-
SHA512
f974af20af7f094dc0ad781e77d4ef43e75b42be2850e1cc9c1bf7877014bf097151bb722947f6915ac73479fd133398274bf7c0ad50eeb53b92a52a4fa0b23c
-
SSDEEP
12288:gy90mzR9dUr8SMwFhu8DiXfx5GJVT08klB+1VgrniU/OTdmekKUpQD:gyF3UrRMOZz108gMU/wQen9D
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1