General
-
Target
64cc5574a17112879e63b32e8ad9544dc7defcf74d9dfe57b5779da753613c10
-
Size
376KB
-
Sample
241110-31bv1s1lem
-
MD5
b8d8a962a6534e04beca663ec6d2b3fa
-
SHA1
0ec67d5dd01aac6f6522c862dd1466d1aa46a414
-
SHA256
64cc5574a17112879e63b32e8ad9544dc7defcf74d9dfe57b5779da753613c10
-
SHA512
61a4b4ea5b3f852da020a3a2be3b7197c44fc494d2aeeb8d45db776b8968b85868fd0f99fbb75e7c0f8b3ba596455416f9fa61b2291082776b12badf3e8b78a8
-
SSDEEP
6144:K/y+bnr+up0yN90QEfvSs6z1w7ucRwv7ZwalNcs2MCR3oWxPVt4PTY38GhZs:tMr6y901vZ6z1UG7ZLlNcnLPVtVJk
Static task
static1
Behavioral task
behavioral1
Sample
64cc5574a17112879e63b32e8ad9544dc7defcf74d9dfe57b5779da753613c10.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
64cc5574a17112879e63b32e8ad9544dc7defcf74d9dfe57b5779da753613c10
-
Size
376KB
-
MD5
b8d8a962a6534e04beca663ec6d2b3fa
-
SHA1
0ec67d5dd01aac6f6522c862dd1466d1aa46a414
-
SHA256
64cc5574a17112879e63b32e8ad9544dc7defcf74d9dfe57b5779da753613c10
-
SHA512
61a4b4ea5b3f852da020a3a2be3b7197c44fc494d2aeeb8d45db776b8968b85868fd0f99fbb75e7c0f8b3ba596455416f9fa61b2291082776b12badf3e8b78a8
-
SSDEEP
6144:K/y+bnr+up0yN90QEfvSs6z1w7ucRwv7ZwalNcs2MCR3oWxPVt4PTY38GhZs:tMr6y901vZ6z1UG7ZLlNcnLPVtVJk
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1