General
-
Target
eee89da7bfd46e78b5a33e07245ac35a8cc9623c2f8d88d7ab73f2c62a47acc7
-
Size
1.2MB
-
Sample
241111-beqnhaslcp
-
MD5
a796a74e6fa11db8a166bf90d2b1df61
-
SHA1
107f209e4a32e187e77307530fb1c7c6b8d27bbb
-
SHA256
eee89da7bfd46e78b5a33e07245ac35a8cc9623c2f8d88d7ab73f2c62a47acc7
-
SHA512
a08e7d6972564b716bc1cc4a44f9ce13c6f641473c653bd66583925931b8468635575e989d217b1bdec42c9ba3a88effae1d1ec3f923cd974eb2757ebf63e5b0
-
SSDEEP
24576:aCbht9y/vN4jFVkUI4Hiew2ltipvLt87VLLLVxCwaUdw578ObN/4SYrnP4uO:aCz9uyy4Hrw2lt2CxxCwbdw57fQSG
Static task
static1
Behavioral task
behavioral1
Sample
eee89da7bfd46e78b5a33e07245ac35a8cc9623c2f8d88d7ab73f2c62a47acc7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eee89da7bfd46e78b5a33e07245ac35a8cc9623c2f8d88d7ab73f2c62a47acc7.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
eee89da7bfd46e78b5a33e07245ac35a8cc9623c2f8d88d7ab73f2c62a47acc7
-
Size
1.2MB
-
MD5
a796a74e6fa11db8a166bf90d2b1df61
-
SHA1
107f209e4a32e187e77307530fb1c7c6b8d27bbb
-
SHA256
eee89da7bfd46e78b5a33e07245ac35a8cc9623c2f8d88d7ab73f2c62a47acc7
-
SHA512
a08e7d6972564b716bc1cc4a44f9ce13c6f641473c653bd66583925931b8468635575e989d217b1bdec42c9ba3a88effae1d1ec3f923cd974eb2757ebf63e5b0
-
SSDEEP
24576:aCbht9y/vN4jFVkUI4Hiew2ltipvLt87VLLLVxCwaUdw578ObN/4SYrnP4uO:aCz9uyy4Hrw2lt2CxxCwbdw57fQSG
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1