General
-
Target
8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db
-
Size
706KB
-
Sample
241104-rlcyzs1fmn
-
MD5
b7d8018d953c487d4d79a64e4223abef
-
SHA1
d8e7781353e837444c733dc4952fafc783b8013d
-
SHA256
8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db
-
SHA512
184e9622cbc8baf75f0d987ece75bf10d8e37f1219cd976fa4b67d2e70e4eeb082bdc202c6794100737a903e11d77e7bf16ba5aaebdd900edebf1a512ba9b426
-
SSDEEP
12288:jy90vItruCxs/F92Uz8jCldIKhAhnlGqsBlYlLLgr4iUHOQ3wEoISAxEHKT:jy2sRxs/FEUzb0RsoyUH3zSGIKT
Static task
static1
Behavioral task
behavioral1
Sample
8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db
-
Size
706KB
-
MD5
b7d8018d953c487d4d79a64e4223abef
-
SHA1
d8e7781353e837444c733dc4952fafc783b8013d
-
SHA256
8b184c236fd99e49677da43a93a5695509731d61fc15ebde9731c717544af2db
-
SHA512
184e9622cbc8baf75f0d987ece75bf10d8e37f1219cd976fa4b67d2e70e4eeb082bdc202c6794100737a903e11d77e7bf16ba5aaebdd900edebf1a512ba9b426
-
SSDEEP
12288:jy90vItruCxs/F92Uz8jCldIKhAhnlGqsBlYlLLgr4iUHOQ3wEoISAxEHKT:jy2sRxs/FEUzb0RsoyUH3zSGIKT
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1