General
-
Target
ba9911c86619bca61cec3e51523524ab33fa3184ae1ee5588a6711a7256e083f
-
Size
829KB
-
Sample
241111-afpbdsyclc
-
MD5
10b544c9370093a9fb07434f57f0d247
-
SHA1
71409854e21f97f8f9e3982cde0982a2f0336b41
-
SHA256
ba9911c86619bca61cec3e51523524ab33fa3184ae1ee5588a6711a7256e083f
-
SHA512
5b14b5223689a699327b1afd658a8589237435340d5944ca035e8c41dba957c95104098b5b6627ff88fc50e7a95d66839987fbdce792438bf5ff3125b00c53f0
-
SSDEEP
12288:Iy90VlDg/+BIlp9PVhWzk862/ry663rXoeIwEedPIZY8702Wnxvf2vasnEj5mhAZ:IyUlC+BCPmk2jkburIPIj7x7EjHZ
Static task
static1
Behavioral task
behavioral1
Sample
ba9911c86619bca61cec3e51523524ab33fa3184ae1ee5588a6711a7256e083f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ba9911c86619bca61cec3e51523524ab33fa3184ae1ee5588a6711a7256e083f
-
Size
829KB
-
MD5
10b544c9370093a9fb07434f57f0d247
-
SHA1
71409854e21f97f8f9e3982cde0982a2f0336b41
-
SHA256
ba9911c86619bca61cec3e51523524ab33fa3184ae1ee5588a6711a7256e083f
-
SHA512
5b14b5223689a699327b1afd658a8589237435340d5944ca035e8c41dba957c95104098b5b6627ff88fc50e7a95d66839987fbdce792438bf5ff3125b00c53f0
-
SSDEEP
12288:Iy90VlDg/+BIlp9PVhWzk862/ry663rXoeIwEedPIZY8702Wnxvf2vasnEj5mhAZ:IyUlC+BCPmk2jkburIPIj7x7EjHZ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1