General
-
Target
59d8d98a5f3f5f8b57ecfaa1ae3a762832420143f555fa7d0f5a184926351373
-
Size
746KB
-
Sample
241110-1jv68awanp
-
MD5
4a0264cb83d4528b90e06f1ed10f9f35
-
SHA1
8b5f16e218eccf8b769d8b2e3707dc7683984cf3
-
SHA256
59d8d98a5f3f5f8b57ecfaa1ae3a762832420143f555fa7d0f5a184926351373
-
SHA512
d3f79e136e4cd087139094be62c1b0fc783268dcf55f5a19336ec551eaba3b530a5dc73772cd04724ab1a020b17332885f5863ebbde6f719fe615eb1cdd891b1
-
SSDEEP
12288:Ry90B9TeoRGdGNAt7rIRL1FLDd1Y7fFiMrKQdw91FWmfUb14wWT0BT+AFEK:RyuxeoR2GqVKZ1Y7oMrzS93nMb1Zo00k
Static task
static1
Behavioral task
behavioral1
Sample
59d8d98a5f3f5f8b57ecfaa1ae3a762832420143f555fa7d0f5a184926351373.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
59d8d98a5f3f5f8b57ecfaa1ae3a762832420143f555fa7d0f5a184926351373
-
Size
746KB
-
MD5
4a0264cb83d4528b90e06f1ed10f9f35
-
SHA1
8b5f16e218eccf8b769d8b2e3707dc7683984cf3
-
SHA256
59d8d98a5f3f5f8b57ecfaa1ae3a762832420143f555fa7d0f5a184926351373
-
SHA512
d3f79e136e4cd087139094be62c1b0fc783268dcf55f5a19336ec551eaba3b530a5dc73772cd04724ab1a020b17332885f5863ebbde6f719fe615eb1cdd891b1
-
SSDEEP
12288:Ry90B9TeoRGdGNAt7rIRL1FLDd1Y7fFiMrKQdw91FWmfUb14wWT0BT+AFEK:RyuxeoR2GqVKZ1Y7oMrzS93nMb1Zo00k
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1