General
-
Target
88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90
-
Size
618KB
-
Sample
241110-1v8axsvrfw
-
MD5
cab8d8fac0352811da89d9880c232048
-
SHA1
34435ada8d7e92c3c8d592f7f2815c81f5206382
-
SHA256
88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90
-
SHA512
227d69623b9a12a66e8d01042a778a91d2f0fc725329cf5f96810991660f327b6e499e717835adcacdcd635f297d1eb12770c8dc7305daa9994d801a2b8d9d77
-
SSDEEP
12288:3y908Rspd6OTeHqhcwAZFeFaInspt6eRGcSNP8KYkQkphTcK/lkH1:3yXRspPTktFeFo6FfYyI
Static task
static1
Behavioral task
behavioral1
Sample
88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90
-
Size
618KB
-
MD5
cab8d8fac0352811da89d9880c232048
-
SHA1
34435ada8d7e92c3c8d592f7f2815c81f5206382
-
SHA256
88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90
-
SHA512
227d69623b9a12a66e8d01042a778a91d2f0fc725329cf5f96810991660f327b6e499e717835adcacdcd635f297d1eb12770c8dc7305daa9994d801a2b8d9d77
-
SSDEEP
12288:3y908Rspd6OTeHqhcwAZFeFaInspt6eRGcSNP8KYkQkphTcK/lkH1:3yXRspPTktFeFo6FfYyI
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1