General
-
Target
7d71784c48d8419a99bd2bd4e92e007e4c78c206d2a1af101e9f82fd8898369f
-
Size
702KB
-
Sample
241110-19nj3awldt
-
MD5
4558aafb0d9cd24203e44958d77914d1
-
SHA1
2c18387bc5e06d43c054f6ad0e790a634dfe6b96
-
SHA256
7d71784c48d8419a99bd2bd4e92e007e4c78c206d2a1af101e9f82fd8898369f
-
SHA512
bff6aabb1c67f7a8450c8c60e53c5a041c4e05a891e567d4674aa1947a2c8874e570c6bf6382c58eb316c24ce59638b386ca631ab76bb9412ed39481c573bff3
-
SSDEEP
12288:Xy90MgEqwq7vVdf+SCooGbN9h1VieNE8PphK8jFfn1BxudGJaezBX/pmx:XyHhbq7D7fz9Ef8//9/VNq
Static task
static1
Behavioral task
behavioral1
Sample
7d71784c48d8419a99bd2bd4e92e007e4c78c206d2a1af101e9f82fd8898369f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7d71784c48d8419a99bd2bd4e92e007e4c78c206d2a1af101e9f82fd8898369f
-
Size
702KB
-
MD5
4558aafb0d9cd24203e44958d77914d1
-
SHA1
2c18387bc5e06d43c054f6ad0e790a634dfe6b96
-
SHA256
7d71784c48d8419a99bd2bd4e92e007e4c78c206d2a1af101e9f82fd8898369f
-
SHA512
bff6aabb1c67f7a8450c8c60e53c5a041c4e05a891e567d4674aa1947a2c8874e570c6bf6382c58eb316c24ce59638b386ca631ab76bb9412ed39481c573bff3
-
SSDEEP
12288:Xy90MgEqwq7vVdf+SCooGbN9h1VieNE8PphK8jFfn1BxudGJaezBX/pmx:XyHhbq7D7fz9Ef8//9/VNq
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1