General
-
Target
243fe2077b67a8927acc2735ec4fe2aec2fcc8755f8bf6f140cb88627e53cd00
-
Size
611KB
-
Sample
241110-1jrtssvpcs
-
MD5
315f1dc5b515aa635c131b165ae10e0f
-
SHA1
83e71a090abfe8c671b8615d98a90fa4ea92621d
-
SHA256
243fe2077b67a8927acc2735ec4fe2aec2fcc8755f8bf6f140cb88627e53cd00
-
SHA512
1fa54afd4dca431f002ea658bec28ae7f5ce954c0594634798c77b68b3d4ca8e3d9ef8aa9569d2b0280edefb18e5109089c94a66b576b4f4abeccec7644274f9
-
SSDEEP
12288:uy90p4GJVDhv5xU0bg0XvVyDoE6ovm+jn7s9bgWtVX9dTNxv1mDzk:uyvGJnbg0XwE96jujVX7TNODzk
Static task
static1
Behavioral task
behavioral1
Sample
243fe2077b67a8927acc2735ec4fe2aec2fcc8755f8bf6f140cb88627e53cd00.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
243fe2077b67a8927acc2735ec4fe2aec2fcc8755f8bf6f140cb88627e53cd00
-
Size
611KB
-
MD5
315f1dc5b515aa635c131b165ae10e0f
-
SHA1
83e71a090abfe8c671b8615d98a90fa4ea92621d
-
SHA256
243fe2077b67a8927acc2735ec4fe2aec2fcc8755f8bf6f140cb88627e53cd00
-
SHA512
1fa54afd4dca431f002ea658bec28ae7f5ce954c0594634798c77b68b3d4ca8e3d9ef8aa9569d2b0280edefb18e5109089c94a66b576b4f4abeccec7644274f9
-
SSDEEP
12288:uy90p4GJVDhv5xU0bg0XvVyDoE6ovm+jn7s9bgWtVX9dTNxv1mDzk:uyvGJnbg0XwE96jujVX7TNODzk
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1