General
-
Target
bd315689b915334f3d74568dbac4a20cb570ddc39387ce39296f8f0dc30261e7
-
Size
663KB
-
Sample
241110-1jhwwsvpby
-
MD5
5f7a43144ab35a295491664a01d17095
-
SHA1
b7c8795fd09bc8436f678d946761a9e49e53036a
-
SHA256
bd315689b915334f3d74568dbac4a20cb570ddc39387ce39296f8f0dc30261e7
-
SHA512
5f6b7ee458812d548745340c837750d655ae12e6b32ca9a401ccfd2b2db09a97131951d3b63c014d2e53fc6309cb87250c1da26f2bec94a52cd90fed1e3e60ff
-
SSDEEP
12288:Waq8NJPg0es3ZIlr0f/rYos+6bNBED9t06ygp5FIODw7SrSywmX44:lVJPwlxospve+inIyDwmX44
Static task
static1
Behavioral task
behavioral1
Sample
de5f8b1c713fb981ec5fc6a279c1b600c9238f5674ccd6f0de9ac9b481cf3870.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
de5f8b1c713fb981ec5fc6a279c1b600c9238f5674ccd6f0de9ac9b481cf3870.exe
-
Size
707KB
-
MD5
0d89ded5f35ade08477ae9cdc277144e
-
SHA1
0be0bb748d8581e843acb8b12d282fb1053f6a0f
-
SHA256
de5f8b1c713fb981ec5fc6a279c1b600c9238f5674ccd6f0de9ac9b481cf3870
-
SHA512
1c534ed387d0b2df97eb532498b93fbff97b5895c975487be77dd93fe0bb88533be2b926a33d2688007ad16b79fa327ac7cdedafd866401e23d9b9743934fff6
-
SSDEEP
12288:vy90BJZE/iI62cWdMCkhkmUkzU792Fj6rOsG6I/cD8KaIjUo1r3:vyMToz69nhkjkzU792Fjvdb27
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1