General
-
Target
dd59b32eb802d0b912761ae90084b86d8d5815c1139c0f18fe36f7b148476fdb
-
Size
687KB
-
Sample
241110-z94qlsvgql
-
MD5
7f36f4f51c34c4dff49470781564f9dd
-
SHA1
5b74ab9db5a906c2eb5a6e88fd884b1d00366adc
-
SHA256
dd59b32eb802d0b912761ae90084b86d8d5815c1139c0f18fe36f7b148476fdb
-
SHA512
c5c67383f4328f1e1ea8a6c49fc2bf1cc8968630047f6086714940a67333b28c9f233287be3bc787b0586a2e85fddd8efb04bf572b3a3172513641e6b62e49cc
-
SSDEEP
12288:Ny90KBnSHR5Ar0ENcIKF5yCSSb3iczdERvCuYEt152w0N/I8wnmT:NymnEWLSm3/+NCuztL2jyn2
Static task
static1
Behavioral task
behavioral1
Sample
dd59b32eb802d0b912761ae90084b86d8d5815c1139c0f18fe36f7b148476fdb.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
dd59b32eb802d0b912761ae90084b86d8d5815c1139c0f18fe36f7b148476fdb
-
Size
687KB
-
MD5
7f36f4f51c34c4dff49470781564f9dd
-
SHA1
5b74ab9db5a906c2eb5a6e88fd884b1d00366adc
-
SHA256
dd59b32eb802d0b912761ae90084b86d8d5815c1139c0f18fe36f7b148476fdb
-
SHA512
c5c67383f4328f1e1ea8a6c49fc2bf1cc8968630047f6086714940a67333b28c9f233287be3bc787b0586a2e85fddd8efb04bf572b3a3172513641e6b62e49cc
-
SSDEEP
12288:Ny90KBnSHR5Ar0ENcIKF5yCSSb3iczdERvCuYEt152w0N/I8wnmT:NymnEWLSm3/+NCuztL2jyn2
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1