General
-
Target
72a054c3c28059d6871e7e7e72ffc706f5469e47d4b3dc645ad8770213be8e92
-
Size
696KB
-
Sample
241111-ar9rgayema
-
MD5
89cf17534bbd53ef49e6bc5ef033268e
-
SHA1
938e401319dc5d41b7c028a72882a955e5012709
-
SHA256
72a054c3c28059d6871e7e7e72ffc706f5469e47d4b3dc645ad8770213be8e92
-
SHA512
25323540755da37c0e96bfe6b2f8deebab1567f72eb247e33d90015811baf5a55e0b57ec0eeb75c498b6dd174937fe346976686c3e8ffba63dd061f9bfe7b95b
-
SSDEEP
12288:by90BEuf44cb2xPLC64ul6U+GHzWuuK2YXFomdYzIfxl9QDfxpe+qqSbZeao0wIK:byp4AuLD4ulX+qWCXFoEGIT9cp8bZOMK
Static task
static1
Behavioral task
behavioral1
Sample
72a054c3c28059d6871e7e7e72ffc706f5469e47d4b3dc645ad8770213be8e92.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
72a054c3c28059d6871e7e7e72ffc706f5469e47d4b3dc645ad8770213be8e92
-
Size
696KB
-
MD5
89cf17534bbd53ef49e6bc5ef033268e
-
SHA1
938e401319dc5d41b7c028a72882a955e5012709
-
SHA256
72a054c3c28059d6871e7e7e72ffc706f5469e47d4b3dc645ad8770213be8e92
-
SHA512
25323540755da37c0e96bfe6b2f8deebab1567f72eb247e33d90015811baf5a55e0b57ec0eeb75c498b6dd174937fe346976686c3e8ffba63dd061f9bfe7b95b
-
SSDEEP
12288:by90BEuf44cb2xPLC64ul6U+GHzWuuK2YXFomdYzIfxl9QDfxpe+qqSbZeao0wIK:byp4AuLD4ulX+qWCXFoEGIT9cp8bZOMK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1