General
-
Target
7ed795b88b273c7a0c497a89255488393dbcf2d61a3398cdcf86bec9ffc0ab24
-
Size
612KB
-
Sample
241110-bmdc5swflc
-
MD5
6622ffd574c68ab7c8f166739f79b7ce
-
SHA1
bb694cc802f8bce817d4c79eade3e25cfd7770d7
-
SHA256
7ed795b88b273c7a0c497a89255488393dbcf2d61a3398cdcf86bec9ffc0ab24
-
SHA512
54739c03ba4a9b622d2d2370b0dbd6d7535054a36574df6323972c4ff91cead11d27e736f01ff74fff3cabc01e330ca0f3ab9674f4578168777b952629444b11
-
SSDEEP
12288:uy90yIgTbun46+h/CwdRZkbN666wMe5Swq2kASQCheFYwYU:uysgTbu8hNRZsb6ze5n/ScYlU
Static task
static1
Behavioral task
behavioral1
Sample
7ed795b88b273c7a0c497a89255488393dbcf2d61a3398cdcf86bec9ffc0ab24.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7ed795b88b273c7a0c497a89255488393dbcf2d61a3398cdcf86bec9ffc0ab24
-
Size
612KB
-
MD5
6622ffd574c68ab7c8f166739f79b7ce
-
SHA1
bb694cc802f8bce817d4c79eade3e25cfd7770d7
-
SHA256
7ed795b88b273c7a0c497a89255488393dbcf2d61a3398cdcf86bec9ffc0ab24
-
SHA512
54739c03ba4a9b622d2d2370b0dbd6d7535054a36574df6323972c4ff91cead11d27e736f01ff74fff3cabc01e330ca0f3ab9674f4578168777b952629444b11
-
SSDEEP
12288:uy90yIgTbun46+h/CwdRZkbN666wMe5Swq2kASQCheFYwYU:uysgTbu8hNRZsb6ze5n/ScYlU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1