General
-
Target
17de80adc6c0b45933f4d91f39b29d623dd50bd9300ce696e538d59b66fc59d0
-
Size
1.2MB
-
Sample
241110-13j83awepl
-
MD5
f31c17dd3d0ea636b9e4b52083652653
-
SHA1
4dae2459195335de9678e3732011cfbefd921e3c
-
SHA256
17de80adc6c0b45933f4d91f39b29d623dd50bd9300ce696e538d59b66fc59d0
-
SHA512
9648516ca48c60ef6f0f885b032c1d99ff4a14eb2b5c2ff28e93d621f0445693111f2f8981b317e9c1f36f99a2f189de951fd6c43572be5e9ba678fde36829b7
-
SSDEEP
24576:eGxKz+TDUpS+Nmj4NGQpy6X6yzjKdFuU40KUcDL0lNp/bPm:eGMOKSUDNGQp9qKqFR4JUcDLqNp/b
Static task
static1
Behavioral task
behavioral1
Sample
17de80adc6c0b45933f4d91f39b29d623dd50bd9300ce696e538d59b66fc59d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17de80adc6c0b45933f4d91f39b29d623dd50bd9300ce696e538d59b66fc59d0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
17de80adc6c0b45933f4d91f39b29d623dd50bd9300ce696e538d59b66fc59d0
-
Size
1.2MB
-
MD5
f31c17dd3d0ea636b9e4b52083652653
-
SHA1
4dae2459195335de9678e3732011cfbefd921e3c
-
SHA256
17de80adc6c0b45933f4d91f39b29d623dd50bd9300ce696e538d59b66fc59d0
-
SHA512
9648516ca48c60ef6f0f885b032c1d99ff4a14eb2b5c2ff28e93d621f0445693111f2f8981b317e9c1f36f99a2f189de951fd6c43572be5e9ba678fde36829b7
-
SSDEEP
24576:eGxKz+TDUpS+Nmj4NGQpy6X6yzjKdFuU40KUcDL0lNp/bPm:eGMOKSUDNGQp9qKqFR4JUcDLqNp/b
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1