General
-
Target
917e788334c71d23250e15a9d05633251b07a3970a9783271296793087e7c9ca
-
Size
1.1MB
-
Sample
241111-a9561askcp
-
MD5
72c44ef7fb651961268a9cfbe3bf6e69
-
SHA1
6b3718b3c4b26586550d52d7b1b12e2eda7847de
-
SHA256
917e788334c71d23250e15a9d05633251b07a3970a9783271296793087e7c9ca
-
SHA512
503d5ff31dcbeddfc8e5c3c007978dc46ecee4251a8359da7f9cecda596cd0178d6f15b858a8c73048aaad79576f106dbeaa06298486ea8eaeac86b17b1179a7
-
SSDEEP
24576:2yPvXwok7OfJwoMoULY3ZneI9VHpKzCetBsBM/8rt:FPvXwokSfJwoMoUwnv9VJKzSBNr
Static task
static1
Behavioral task
behavioral1
Sample
917e788334c71d23250e15a9d05633251b07a3970a9783271296793087e7c9ca.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
917e788334c71d23250e15a9d05633251b07a3970a9783271296793087e7c9ca
-
Size
1.1MB
-
MD5
72c44ef7fb651961268a9cfbe3bf6e69
-
SHA1
6b3718b3c4b26586550d52d7b1b12e2eda7847de
-
SHA256
917e788334c71d23250e15a9d05633251b07a3970a9783271296793087e7c9ca
-
SHA512
503d5ff31dcbeddfc8e5c3c007978dc46ecee4251a8359da7f9cecda596cd0178d6f15b858a8c73048aaad79576f106dbeaa06298486ea8eaeac86b17b1179a7
-
SSDEEP
24576:2yPvXwok7OfJwoMoULY3ZneI9VHpKzCetBsBM/8rt:FPvXwokSfJwoMoUwnv9VJKzSBNr
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1