General
-
Target
d43b02c153a6971ef361f6a6875aa24761c3a193cd406ba895b103cbe3d6fe33
-
Size
701KB
-
Sample
241110-zzj88awajd
-
MD5
91b655ba8e3d7c02a0e42da71d9330e4
-
SHA1
d5849543eb25043d42424d5582704ab2c6f5344f
-
SHA256
d43b02c153a6971ef361f6a6875aa24761c3a193cd406ba895b103cbe3d6fe33
-
SHA512
27214deb4c71378cba842bda4b843b4c9ed24e0a62e0f52b510566d68a2c866971c515a04b834366907c5a514ab97316829d7742fb0310ad1b8090d7ed6f9097
-
SSDEEP
12288:0y90pH91mSQqo0vOi+kbuouslkRi6xASyghk9EG21o9wx6N0h0SeNKBFs+wm:0y8kqoAh61zkyGRwU67dBFHwm
Static task
static1
Behavioral task
behavioral1
Sample
d43b02c153a6971ef361f6a6875aa24761c3a193cd406ba895b103cbe3d6fe33.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d43b02c153a6971ef361f6a6875aa24761c3a193cd406ba895b103cbe3d6fe33
-
Size
701KB
-
MD5
91b655ba8e3d7c02a0e42da71d9330e4
-
SHA1
d5849543eb25043d42424d5582704ab2c6f5344f
-
SHA256
d43b02c153a6971ef361f6a6875aa24761c3a193cd406ba895b103cbe3d6fe33
-
SHA512
27214deb4c71378cba842bda4b843b4c9ed24e0a62e0f52b510566d68a2c866971c515a04b834366907c5a514ab97316829d7742fb0310ad1b8090d7ed6f9097
-
SSDEEP
12288:0y90pH91mSQqo0vOi+kbuouslkRi6xASyghk9EG21o9wx6N0h0SeNKBFs+wm:0y8kqoAh61zkyGRwU67dBFHwm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1