General
-
Target
87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035
-
Size
695KB
-
Sample
241104-ra1wnsznby
-
MD5
a77f2775bd759720f6be370be398d446
-
SHA1
fb4d57ae20efa8f6049c5f184065fa1c4676e3dc
-
SHA256
87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035
-
SHA512
9a5f7e87f23ad7cfe78504309ce69fb39bb335931f4a35ba4dac9212c7c24207dfa3995726245ae0693217fc3046e6bd9547eccf5e9e63eb6e215ca871a68448
-
SSDEEP
12288:fy900O4BQpzHBgO0jeDyOB4ByWke89SQDZRhuaHq0iDVe72dBHwxz++g:fy040+jOJBJ9e1EjxTOe72dBQRg
Static task
static1
Behavioral task
behavioral1
Sample
87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035
-
Size
695KB
-
MD5
a77f2775bd759720f6be370be398d446
-
SHA1
fb4d57ae20efa8f6049c5f184065fa1c4676e3dc
-
SHA256
87d0736cc4b3a15613ac3bf20afe23f2be07ccb4620ee5223cdf6400cee52035
-
SHA512
9a5f7e87f23ad7cfe78504309ce69fb39bb335931f4a35ba4dac9212c7c24207dfa3995726245ae0693217fc3046e6bd9547eccf5e9e63eb6e215ca871a68448
-
SSDEEP
12288:fy900O4BQpzHBgO0jeDyOB4ByWke89SQDZRhuaHq0iDVe72dBHwxz++g:fy040+jOJBJ9e1EjxTOe72dBQRg
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1