General
-
Target
d690125597a47a80419d3cb431f2a35057c771b7f827b1509e4355e487617b5c
-
Size
564KB
-
Sample
241110-1z5qlawhle
-
MD5
116cc52af72433f5b563d90b44ec324a
-
SHA1
bb675c7ba709d104154ba49faa7cc6e66dd1c1d0
-
SHA256
d690125597a47a80419d3cb431f2a35057c771b7f827b1509e4355e487617b5c
-
SHA512
ce57c6b183ba2eab84dd4becc17c6ed9d5935af5f5093f8fb4489aff89af275df9515a3b63b2c148e967d64c264530df1b31896bca9192feb9a2d866731e7099
-
SSDEEP
12288:My90USJiSo4Wj2x2yjkukIPXzc0fCunMJqPKjL9f4QP8:My48B4XAubDDfC6eqPKjL9P8
Static task
static1
Behavioral task
behavioral1
Sample
d690125597a47a80419d3cb431f2a35057c771b7f827b1509e4355e487617b5c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d690125597a47a80419d3cb431f2a35057c771b7f827b1509e4355e487617b5c
-
Size
564KB
-
MD5
116cc52af72433f5b563d90b44ec324a
-
SHA1
bb675c7ba709d104154ba49faa7cc6e66dd1c1d0
-
SHA256
d690125597a47a80419d3cb431f2a35057c771b7f827b1509e4355e487617b5c
-
SHA512
ce57c6b183ba2eab84dd4becc17c6ed9d5935af5f5093f8fb4489aff89af275df9515a3b63b2c148e967d64c264530df1b31896bca9192feb9a2d866731e7099
-
SSDEEP
12288:My90USJiSo4Wj2x2yjkukIPXzc0fCunMJqPKjL9f4QP8:My48B4XAubDDfC6eqPKjL9P8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1