General
-
Target
774956f3ab4e2a49aabec41b5e6b8a849ff2277508ac4ff75bcf33b08fe6e43c
-
Size
563KB
-
Sample
241110-1d2f2svhnl
-
MD5
a683e0b64943a83de6bdd67329036770
-
SHA1
ae5aa8869d72c9fe4033246f64fe0eb001c5b252
-
SHA256
774956f3ab4e2a49aabec41b5e6b8a849ff2277508ac4ff75bcf33b08fe6e43c
-
SHA512
26b5890bdac5f2e6984565a634a775b756e3bca57a40308a3ef7da975087197d8194f6dc65cfa56ceea3479a92dfcb5c0c6377ddae679690f070b7aa1f33bd2e
-
SSDEEP
12288:Yy90Hyc5ZKCJYIt1jLzuvMWzbQNxhvoRPih5:YyERJYIt13zIGVo25
Static task
static1
Behavioral task
behavioral1
Sample
774956f3ab4e2a49aabec41b5e6b8a849ff2277508ac4ff75bcf33b08fe6e43c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
774956f3ab4e2a49aabec41b5e6b8a849ff2277508ac4ff75bcf33b08fe6e43c
-
Size
563KB
-
MD5
a683e0b64943a83de6bdd67329036770
-
SHA1
ae5aa8869d72c9fe4033246f64fe0eb001c5b252
-
SHA256
774956f3ab4e2a49aabec41b5e6b8a849ff2277508ac4ff75bcf33b08fe6e43c
-
SHA512
26b5890bdac5f2e6984565a634a775b756e3bca57a40308a3ef7da975087197d8194f6dc65cfa56ceea3479a92dfcb5c0c6377ddae679690f070b7aa1f33bd2e
-
SSDEEP
12288:Yy90Hyc5ZKCJYIt1jLzuvMWzbQNxhvoRPih5:YyERJYIt13zIGVo25
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1