General
-
Target
aa771c6f388766dafbf9b31e5988c047f9589ccbc21655b048cfc2bc1e863e2e
-
Size
1.2MB
-
Sample
241110-ehsh2szaqe
-
MD5
3883f607feef3a1e231df98ef04c4357
-
SHA1
858783eeff48f75c63c7f136484532d7cb99912e
-
SHA256
aa771c6f388766dafbf9b31e5988c047f9589ccbc21655b048cfc2bc1e863e2e
-
SHA512
726d43818eeb121824af1eedb07fd27d50642cf501245b0d77b297d9f990f3585e6a7b1498000ca404997f40edc0cbee878b56224ad7b972a7babb724b5fd889
-
SSDEEP
24576:1VQCVvyI/k4Zf9YMGp77zdd0ZKUNk9e0KUDsM1dpkJNK35m:1Vtvhk499YMGVzddAge0KUDsiyNK
Static task
static1
Behavioral task
behavioral1
Sample
aa771c6f388766dafbf9b31e5988c047f9589ccbc21655b048cfc2bc1e863e2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aa771c6f388766dafbf9b31e5988c047f9589ccbc21655b048cfc2bc1e863e2e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
aa771c6f388766dafbf9b31e5988c047f9589ccbc21655b048cfc2bc1e863e2e
-
Size
1.2MB
-
MD5
3883f607feef3a1e231df98ef04c4357
-
SHA1
858783eeff48f75c63c7f136484532d7cb99912e
-
SHA256
aa771c6f388766dafbf9b31e5988c047f9589ccbc21655b048cfc2bc1e863e2e
-
SHA512
726d43818eeb121824af1eedb07fd27d50642cf501245b0d77b297d9f990f3585e6a7b1498000ca404997f40edc0cbee878b56224ad7b972a7babb724b5fd889
-
SSDEEP
24576:1VQCVvyI/k4Zf9YMGp77zdd0ZKUNk9e0KUDsM1dpkJNK35m:1Vtvhk499YMGVzddAge0KUDsiyNK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1