General
-
Target
9647b73a2a39652dc39fd7b6b73f0a380ec6709903c2ea46854906319b705748
-
Size
560KB
-
Sample
241110-3ph5ysxgrc
-
MD5
72a9cb3c1493e9b5dcd8851d25d9d344
-
SHA1
98e22cfc18f46ce22c220d202d3c6d43f705c8e7
-
SHA256
9647b73a2a39652dc39fd7b6b73f0a380ec6709903c2ea46854906319b705748
-
SHA512
c1f8b9916d52722b6db523a20c34261dbd264b644122eabca7f19fe89895d738b31fd7478c46a96770dc350c2dc9ffe98735df327f0fa09543cfd0e1aa6e5ac5
-
SSDEEP
12288:iy90lTbCIWY5jqERcTQD6HQkaphvJLFTt1B2udVJzm5VJlp:iyMnDWYMEUpwl/rg+m5VLp
Static task
static1
Behavioral task
behavioral1
Sample
9647b73a2a39652dc39fd7b6b73f0a380ec6709903c2ea46854906319b705748.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9647b73a2a39652dc39fd7b6b73f0a380ec6709903c2ea46854906319b705748
-
Size
560KB
-
MD5
72a9cb3c1493e9b5dcd8851d25d9d344
-
SHA1
98e22cfc18f46ce22c220d202d3c6d43f705c8e7
-
SHA256
9647b73a2a39652dc39fd7b6b73f0a380ec6709903c2ea46854906319b705748
-
SHA512
c1f8b9916d52722b6db523a20c34261dbd264b644122eabca7f19fe89895d738b31fd7478c46a96770dc350c2dc9ffe98735df327f0fa09543cfd0e1aa6e5ac5
-
SSDEEP
12288:iy90lTbCIWY5jqERcTQD6HQkaphvJLFTt1B2udVJzm5VJlp:iyMnDWYMEUpwl/rg+m5VLp
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1