General
-
Target
eaaca63171fb76bd2ac8f2105e363c215baebba7b275cee61096464f3cbdc156
-
Size
1.2MB
-
Sample
241111-bqklmaymbs
-
MD5
22804dc7b9d8f3d88fb2c8d6783ce62a
-
SHA1
90d70b542ef097627809a45128573c81a011e041
-
SHA256
eaaca63171fb76bd2ac8f2105e363c215baebba7b275cee61096464f3cbdc156
-
SHA512
8b401450d55d29563ac24e8eeb5324f0cf7eb1b2dd7006f8c11e44db3d580153dac039123e4a76d38a7451b3a1b7c27c913b4f288da21e692139a9d5d055a04e
-
SSDEEP
24576:50zwEbpelsnjkyfxpcP7kJxnSnF83PRiGBgy3rIgBQzbypT6bg6gO:50zNUYjkCcPoJgK3ss+y4bN
Static task
static1
Behavioral task
behavioral1
Sample
eaaca63171fb76bd2ac8f2105e363c215baebba7b275cee61096464f3cbdc156.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaca63171fb76bd2ac8f2105e363c215baebba7b275cee61096464f3cbdc156.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
eaaca63171fb76bd2ac8f2105e363c215baebba7b275cee61096464f3cbdc156
-
Size
1.2MB
-
MD5
22804dc7b9d8f3d88fb2c8d6783ce62a
-
SHA1
90d70b542ef097627809a45128573c81a011e041
-
SHA256
eaaca63171fb76bd2ac8f2105e363c215baebba7b275cee61096464f3cbdc156
-
SHA512
8b401450d55d29563ac24e8eeb5324f0cf7eb1b2dd7006f8c11e44db3d580153dac039123e4a76d38a7451b3a1b7c27c913b4f288da21e692139a9d5d055a04e
-
SSDEEP
24576:50zwEbpelsnjkyfxpcP7kJxnSnF83PRiGBgy3rIgBQzbypT6bg6gO:50zNUYjkCcPoJgK3ss+y4bN
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1