General
-
Target
7a8a9e67c12af61af5825ba1c9edcfffa705bc56aab6beb9c194c3895a6cb7ae
-
Size
695KB
-
Sample
241110-3sd1ea1kaq
-
MD5
4f0c4f19481b9aef8f8e66559d008c08
-
SHA1
c7203ebeed285238e2ec3b5fe0fa17caf01377fe
-
SHA256
7a8a9e67c12af61af5825ba1c9edcfffa705bc56aab6beb9c194c3895a6cb7ae
-
SHA512
568d2323185f18f1615650b92633a37f2c9ea04853520761f9dbce47c3a805bdcb16d0d7f0a00b33f8a67a17b790e25bd8879f9476d27b6c2c8d73406a483d08
-
SSDEEP
12288:ny90ZBSFOjbQxiRJNaFogz7VF4/QvWr5a/00GUYXVwQGy8RUYRos63J8:nyuBVQ8MFou78QvWr5UjlYlwQU2suO
Static task
static1
Behavioral task
behavioral1
Sample
7a8a9e67c12af61af5825ba1c9edcfffa705bc56aab6beb9c194c3895a6cb7ae.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7a8a9e67c12af61af5825ba1c9edcfffa705bc56aab6beb9c194c3895a6cb7ae
-
Size
695KB
-
MD5
4f0c4f19481b9aef8f8e66559d008c08
-
SHA1
c7203ebeed285238e2ec3b5fe0fa17caf01377fe
-
SHA256
7a8a9e67c12af61af5825ba1c9edcfffa705bc56aab6beb9c194c3895a6cb7ae
-
SHA512
568d2323185f18f1615650b92633a37f2c9ea04853520761f9dbce47c3a805bdcb16d0d7f0a00b33f8a67a17b790e25bd8879f9476d27b6c2c8d73406a483d08
-
SSDEEP
12288:ny90ZBSFOjbQxiRJNaFogz7VF4/QvWr5a/00GUYXVwQGy8RUYRos63J8:nyuBVQ8MFou78QvWr5UjlYlwQU2suO
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1