General
-
Target
9171bf602eed2cc060d9014d550c42fb7af707e20ccc3763cc93baa071e87158
-
Size
944KB
-
Sample
241110-1r5evswfpg
-
MD5
565c0c2ee53c4aa6e314afd8961dc10f
-
SHA1
96f590c1abecaa9bcc5974aabfe5380bd7fb4e08
-
SHA256
9171bf602eed2cc060d9014d550c42fb7af707e20ccc3763cc93baa071e87158
-
SHA512
fc6ef39e26fd4101d75eb48bc972825fa46224a7692089b1634224fa7733cd93f4688751a73c0ff2701b6c4ea6f2f8c2015cec632600be8dc6d2dc2ad1b4ce29
-
SSDEEP
24576:RyTV59f+wWjmlNeMqWbeMr3nOBJ8Y1IR2mKQi6:ETV59f+l6+Mr3guGIR2mvi
Static task
static1
Behavioral task
behavioral1
Sample
9171bf602eed2cc060d9014d550c42fb7af707e20ccc3763cc93baa071e87158.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9171bf602eed2cc060d9014d550c42fb7af707e20ccc3763cc93baa071e87158
-
Size
944KB
-
MD5
565c0c2ee53c4aa6e314afd8961dc10f
-
SHA1
96f590c1abecaa9bcc5974aabfe5380bd7fb4e08
-
SHA256
9171bf602eed2cc060d9014d550c42fb7af707e20ccc3763cc93baa071e87158
-
SHA512
fc6ef39e26fd4101d75eb48bc972825fa46224a7692089b1634224fa7733cd93f4688751a73c0ff2701b6c4ea6f2f8c2015cec632600be8dc6d2dc2ad1b4ce29
-
SSDEEP
24576:RyTV59f+wWjmlNeMqWbeMr3nOBJ8Y1IR2mKQi6:ETV59f+l6+Mr3guGIR2mvi
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1