General
-
Target
d741e515da5b3b846288b2e9a6a767d25c0cb718dec18d9eb49e7522d91d642c
-
Size
701KB
-
Sample
241110-a59nmavnds
-
MD5
d2cc84c727bad147e5880334abecf227
-
SHA1
305ce2995ce0edd9f0ebeb7a381d4fef3a453b4a
-
SHA256
d741e515da5b3b846288b2e9a6a767d25c0cb718dec18d9eb49e7522d91d642c
-
SHA512
da95807f163fb3d6720f62260fdffd3fa46d93d53d207b25a6d708e0687460e9d64eb376eacbd47877db5db536aef687c397244e876daef9dbd606c13ced62d4
-
SSDEEP
12288:Jy90/7zVdopRwx4m6fOzlVNksFPOMqYfe275tN5GBi/fTyRHBCsxE2JH:Jy67Zu24m9zl8WPPVUSTyRHBCsi2h
Static task
static1
Behavioral task
behavioral1
Sample
d741e515da5b3b846288b2e9a6a767d25c0cb718dec18d9eb49e7522d91d642c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d741e515da5b3b846288b2e9a6a767d25c0cb718dec18d9eb49e7522d91d642c
-
Size
701KB
-
MD5
d2cc84c727bad147e5880334abecf227
-
SHA1
305ce2995ce0edd9f0ebeb7a381d4fef3a453b4a
-
SHA256
d741e515da5b3b846288b2e9a6a767d25c0cb718dec18d9eb49e7522d91d642c
-
SHA512
da95807f163fb3d6720f62260fdffd3fa46d93d53d207b25a6d708e0687460e9d64eb376eacbd47877db5db536aef687c397244e876daef9dbd606c13ced62d4
-
SSDEEP
12288:Jy90/7zVdopRwx4m6fOzlVNksFPOMqYfe275tN5GBi/fTyRHBCsxE2JH:Jy67Zu24m9zl8WPPVUSTyRHBCsi2h
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1