General
-
Target
677798afbbca3847208118620750f0573cdc7a243d36910492f4459c9d69099c
-
Size
694KB
-
Sample
241110-z5f4rawarg
-
MD5
147e6a7d44e33a3c5e34d9f8707e65b8
-
SHA1
ae834aa07888dbcc0420b9692c2dc2da6db67a88
-
SHA256
677798afbbca3847208118620750f0573cdc7a243d36910492f4459c9d69099c
-
SHA512
a7a6d71204fbf3320596fadaea03d20961763c9a7caf31bc5cd12dd0c8400b79afb02efa69709e08a9999d751c7ac0a4b45ee3a38d38c01d2245716b91d14525
-
SSDEEP
12288:Jy90Ruomobe3Bt98IX/2O3OFTRMrJC9O7SJcW76Fw18bgKcA+4Gdq6jn0:JyCuomobo7sNFyr/u6Fw18bgXOq/0
Static task
static1
Behavioral task
behavioral1
Sample
677798afbbca3847208118620750f0573cdc7a243d36910492f4459c9d69099c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
677798afbbca3847208118620750f0573cdc7a243d36910492f4459c9d69099c
-
Size
694KB
-
MD5
147e6a7d44e33a3c5e34d9f8707e65b8
-
SHA1
ae834aa07888dbcc0420b9692c2dc2da6db67a88
-
SHA256
677798afbbca3847208118620750f0573cdc7a243d36910492f4459c9d69099c
-
SHA512
a7a6d71204fbf3320596fadaea03d20961763c9a7caf31bc5cd12dd0c8400b79afb02efa69709e08a9999d751c7ac0a4b45ee3a38d38c01d2245716b91d14525
-
SSDEEP
12288:Jy90Ruomobe3Bt98IX/2O3OFTRMrJC9O7SJcW76Fw18bgKcA+4Gdq6jn0:JyCuomobo7sNFyr/u6Fw18bgXOq/0
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1