General
-
Target
35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b
-
Size
705KB
-
Sample
241111-c98y1a1cpl
-
MD5
23441cc20ece3b1c75a725168040c8d5
-
SHA1
ff08b63ef53e1d0762f970df97eb366bc35cfa50
-
SHA256
35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b
-
SHA512
0002c0b3e2eb1db5d79e2ee14a0fdfe019d65147d6203f236457024192c573d713f1a4398524577a9fb33d8bc54424dbf41903cb7915be02a95dc599c4a8c91c
-
SSDEEP
12288:ry90iWsjrrlb/g1Dtuscw0z3pkf31irn9Y8c0r4Zbf4uYcGRV:ryqetgD+wi6vYrnfc8uZGX
Static task
static1
Behavioral task
behavioral1
Sample
35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b
-
Size
705KB
-
MD5
23441cc20ece3b1c75a725168040c8d5
-
SHA1
ff08b63ef53e1d0762f970df97eb366bc35cfa50
-
SHA256
35119711b6d9c6dc6f2e81ea22f30694f4159affcf82dc8dacd8814789ccd09b
-
SHA512
0002c0b3e2eb1db5d79e2ee14a0fdfe019d65147d6203f236457024192c573d713f1a4398524577a9fb33d8bc54424dbf41903cb7915be02a95dc599c4a8c91c
-
SSDEEP
12288:ry90iWsjrrlb/g1Dtuscw0z3pkf31irn9Y8c0r4Zbf4uYcGRV:ryqetgD+wi6vYrnfc8uZGX
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1