General
-
Target
b7a97f5c651f69fd0a78d64d2cde21a85f2ac7f89754678241d0f1f043b20902
-
Size
1.5MB
-
Sample
241110-3ntkasxelm
-
MD5
575e0df06e03f3aab8aff3842186e2fa
-
SHA1
678e144810f6c5f45f1043fa793d07861badf91d
-
SHA256
b7a97f5c651f69fd0a78d64d2cde21a85f2ac7f89754678241d0f1f043b20902
-
SHA512
61c3adcafc728fa474fc85d7ef995abb09e8d73aed8deee0d94e640db32b87e3815310984e33fbae159bc2590c0f42413ef15607b88e89ffef9746a7684c7040
-
SSDEEP
49152:bGluRiRXFE+7hZKKqTxGG/76Nn4NBgg2Eqq:ylykVQzTxGG+NeBgjvq
Static task
static1
Behavioral task
behavioral1
Sample
b7a97f5c651f69fd0a78d64d2cde21a85f2ac7f89754678241d0f1f043b20902.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b7a97f5c651f69fd0a78d64d2cde21a85f2ac7f89754678241d0f1f043b20902
-
Size
1.5MB
-
MD5
575e0df06e03f3aab8aff3842186e2fa
-
SHA1
678e144810f6c5f45f1043fa793d07861badf91d
-
SHA256
b7a97f5c651f69fd0a78d64d2cde21a85f2ac7f89754678241d0f1f043b20902
-
SHA512
61c3adcafc728fa474fc85d7ef995abb09e8d73aed8deee0d94e640db32b87e3815310984e33fbae159bc2590c0f42413ef15607b88e89ffef9746a7684c7040
-
SSDEEP
49152:bGluRiRXFE+7hZKKqTxGG/76Nn4NBgg2Eqq:ylykVQzTxGG+NeBgjvq
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1