General
-
Target
70f89fe55f70268a9e119cecc33161af5e061e1710c9be208028b892158507cd
-
Size
480KB
-
Sample
241110-1jqazaypam
-
MD5
5ce6e20aa098adb23350b51db11aba86
-
SHA1
30df0defd078a3725707da2bd966b41f86914013
-
SHA256
70f89fe55f70268a9e119cecc33161af5e061e1710c9be208028b892158507cd
-
SHA512
2a7be78491529dd90598ea8dfd577380971f678cf33e775ad282fe2ce243eaf196719bbab686cc9343ffebffdad31c3b4dfb70a4c682c3f6b19fa507e5913dd7
-
SSDEEP
12288:LMrSy90J4zf1r8gRHJxuTcegaICjqE2f70riqdvI:5yo4j1jHJZegKqie6I
Static task
static1
Behavioral task
behavioral1
Sample
70f89fe55f70268a9e119cecc33161af5e061e1710c9be208028b892158507cd.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
70f89fe55f70268a9e119cecc33161af5e061e1710c9be208028b892158507cd
-
Size
480KB
-
MD5
5ce6e20aa098adb23350b51db11aba86
-
SHA1
30df0defd078a3725707da2bd966b41f86914013
-
SHA256
70f89fe55f70268a9e119cecc33161af5e061e1710c9be208028b892158507cd
-
SHA512
2a7be78491529dd90598ea8dfd577380971f678cf33e775ad282fe2ce243eaf196719bbab686cc9343ffebffdad31c3b4dfb70a4c682c3f6b19fa507e5913dd7
-
SSDEEP
12288:LMrSy90J4zf1r8gRHJxuTcegaICjqE2f70riqdvI:5yo4j1jHJZegKqie6I
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1