General
-
Target
60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9
-
Size
1.5MB
-
Sample
241110-1611zswkhv
-
MD5
8bd3e45e5d756925df1cff21f98b458f
-
SHA1
7c01d8e7c80c88db90fa7064dd84aa2d9ce969a7
-
SHA256
60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9
-
SHA512
e4083fc6884b56befb90096f41bbaa04b8b308db82ecc84261b0ef4433f84b9cd80a54904c53fb589361b248908c3db68cf6afe73405ee6e70434a7f087f7040
-
SSDEEP
49152:85vxHijNe9nIa0oQSgOQWDKskO+Dyomf9BQHiAEcbr:WvxCjEIa0QQmO7wBaHEcb
Static task
static1
Behavioral task
behavioral1
Sample
60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9
-
Size
1.5MB
-
MD5
8bd3e45e5d756925df1cff21f98b458f
-
SHA1
7c01d8e7c80c88db90fa7064dd84aa2d9ce969a7
-
SHA256
60789b8e53b339aa0c38a30d9d01f09a22e55f0a6b0381a8810683ef2cca36b9
-
SHA512
e4083fc6884b56befb90096f41bbaa04b8b308db82ecc84261b0ef4433f84b9cd80a54904c53fb589361b248908c3db68cf6afe73405ee6e70434a7f087f7040
-
SSDEEP
49152:85vxHijNe9nIa0oQSgOQWDKskO+Dyomf9BQHiAEcbr:WvxCjEIa0QQmO7wBaHEcb
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1