General
-
Target
79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478
-
Size
727KB
-
Sample
241111-byf86syncy
-
MD5
332ce294791a9087724ad71d205d0301
-
SHA1
bffc2e69db0342d9f690dd313533162f23501241
-
SHA256
79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478
-
SHA512
a7e9797ff248feef93a2abf2f7cb1c05742779e45dde98cc03fbee5e23d162e7d517257d1dbed576fac3245947f76f8c52d1a2ce14c95c4821871eadb39ea67e
-
SSDEEP
12288:by90uPy9s0V7t75N8vkI0j/FCBMBFlunUu2jDFw/lq+N:bygfVt7iKPXunv2j54lq+N
Static task
static1
Behavioral task
behavioral1
Sample
79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478
-
Size
727KB
-
MD5
332ce294791a9087724ad71d205d0301
-
SHA1
bffc2e69db0342d9f690dd313533162f23501241
-
SHA256
79ac44b9f977eb61b03717dd0dcedb7051461361ad74cf128c903171765a7478
-
SHA512
a7e9797ff248feef93a2abf2f7cb1c05742779e45dde98cc03fbee5e23d162e7d517257d1dbed576fac3245947f76f8c52d1a2ce14c95c4821871eadb39ea67e
-
SSDEEP
12288:by90uPy9s0V7t75N8vkI0j/FCBMBFlunUu2jDFw/lq+N:bygfVt7iKPXunv2j54lq+N
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1