General
-
Target
561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe
-
Size
696KB
-
Sample
241110-z7rchaylhq
-
MD5
c5e42bafbca6d049f4cd99ef0f027541
-
SHA1
ee172b08ab3ce627f7e2167f042ee2a1312a5276
-
SHA256
561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d
-
SHA512
1050e69d91f23d67d5004f23642df4d1b79ccaaa96bfa01b85a46e854b5ed35257bcd899ef251cfa9e89858e3d6785e5846334f68a21314200cd8f8a76543fb7
-
SSDEEP
12288:+y90igmVA5zd1fzi/4l+NfLGeeFH2+Xm7INtHLlMqdcpAboPE:+ylgyodJWaQDBell28dyACE
Static task
static1
Behavioral task
behavioral1
Sample
561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d.exe
-
Size
696KB
-
MD5
c5e42bafbca6d049f4cd99ef0f027541
-
SHA1
ee172b08ab3ce627f7e2167f042ee2a1312a5276
-
SHA256
561d703d3d761c1b27d967746069043443c5973a82032b41e38f7f132369fa9d
-
SHA512
1050e69d91f23d67d5004f23642df4d1b79ccaaa96bfa01b85a46e854b5ed35257bcd899ef251cfa9e89858e3d6785e5846334f68a21314200cd8f8a76543fb7
-
SSDEEP
12288:+y90igmVA5zd1fzi/4l+NfLGeeFH2+Xm7INtHLlMqdcpAboPE:+ylgyodJWaQDBell28dyACE
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1