General
-
Target
843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93
-
Size
923KB
-
Sample
241111-a91xaayhqb
-
MD5
72cf1dc37983d701fde1828685e7ba26
-
SHA1
06714b38824dc8744c3964bc1730fc53c64a8604
-
SHA256
843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93
-
SHA512
0e5390f8d81cc050f84ff822756711149ad121262849d9f4542e317c16f535c3f2880f9c71090be3cdfccc8b50410daa2336ce262ffa7628ab951a1184b93a78
-
SSDEEP
24576:0yIwdD1NTAts+HhM0VbTGKIgeh19t1NhKnI5huH:DIwdJNTAZH7Tc19fyo
Static task
static1
Behavioral task
behavioral1
Sample
843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93
-
Size
923KB
-
MD5
72cf1dc37983d701fde1828685e7ba26
-
SHA1
06714b38824dc8744c3964bc1730fc53c64a8604
-
SHA256
843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93
-
SHA512
0e5390f8d81cc050f84ff822756711149ad121262849d9f4542e317c16f535c3f2880f9c71090be3cdfccc8b50410daa2336ce262ffa7628ab951a1184b93a78
-
SSDEEP
24576:0yIwdD1NTAts+HhM0VbTGKIgeh19t1NhKnI5huH:DIwdJNTAZH7Tc19fyo
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1