General
-
Target
7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111
-
Size
707KB
-
Sample
241104-re9z5s1bmc
-
MD5
fa1e382fc41c2312ad2b298800a79494
-
SHA1
f15b527d8dbf67e34945fad765f897408384ed40
-
SHA256
7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111
-
SHA512
2d5401920b3a4e4d409a32b93843f880383a54703a5e99395e189f45a812d90fb50907d96ed7b2dec927a82756b76e86e96b025175097fa1b1a3d29a47cdb324
-
SSDEEP
12288:fy90dUTi9uAd9Qkq00tuRYDbNPUAl+5JXBGdFzOAy6w/cE8+EOSYBn:fyyUm9uAfQkqTxPUa+ZGdFKZ7Pbn
Static task
static1
Behavioral task
behavioral1
Sample
7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111
-
Size
707KB
-
MD5
fa1e382fc41c2312ad2b298800a79494
-
SHA1
f15b527d8dbf67e34945fad765f897408384ed40
-
SHA256
7ea2732b926ade32452d0070607583f9cd04b15c4b872620ebe0d46cb4651111
-
SHA512
2d5401920b3a4e4d409a32b93843f880383a54703a5e99395e189f45a812d90fb50907d96ed7b2dec927a82756b76e86e96b025175097fa1b1a3d29a47cdb324
-
SSDEEP
12288:fy90dUTi9uAd9Qkq00tuRYDbNPUAl+5JXBGdFzOAy6w/cE8+EOSYBn:fyyUm9uAfQkqTxPUa+ZGdFKZ7Pbn
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1