General
-
Target
df424d9702d0a1907f451aaf72d408c435831d21f67e95649b228538bfb73dcc
-
Size
642KB
-
Sample
241111-b7s94azfmh
-
MD5
da78164030aa565f5850945e87673df2
-
SHA1
53d05be87e940d7b81f32142099d07a6b3d43762
-
SHA256
df424d9702d0a1907f451aaf72d408c435831d21f67e95649b228538bfb73dcc
-
SHA512
cd3098e8b67e8d5e179823f5e553625134aa75bcafb8b1bc1a37d045b49f6d203b8c4ac6b9d3cbc7b9996beb3d876b0ef83fb23a76477a91d9b9109520c425ff
-
SSDEEP
12288:Py901qn6c6D/XzEYzs+td1mGVY+k6wvjVLEzy0cRh2u4fbQ:PyV6c6D/xV1mG6FVLsyn4f8
Static task
static1
Behavioral task
behavioral1
Sample
df424d9702d0a1907f451aaf72d408c435831d21f67e95649b228538bfb73dcc.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
df424d9702d0a1907f451aaf72d408c435831d21f67e95649b228538bfb73dcc
-
Size
642KB
-
MD5
da78164030aa565f5850945e87673df2
-
SHA1
53d05be87e940d7b81f32142099d07a6b3d43762
-
SHA256
df424d9702d0a1907f451aaf72d408c435831d21f67e95649b228538bfb73dcc
-
SHA512
cd3098e8b67e8d5e179823f5e553625134aa75bcafb8b1bc1a37d045b49f6d203b8c4ac6b9d3cbc7b9996beb3d876b0ef83fb23a76477a91d9b9109520c425ff
-
SSDEEP
12288:Py901qn6c6D/XzEYzs+td1mGVY+k6wvjVLEzy0cRh2u4fbQ:PyV6c6D/xV1mG6FVLsyn4f8
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1