General
-
Target
55fb7af7fa09cca06434d2f6ce71aa56952b5b574da1d6a728b1ca7fb36ca4cc
-
Size
943KB
-
Sample
241111-ca8tystjar
-
MD5
be8c4039185fe2289d253886372d1457
-
SHA1
060be3703d851fbcdd9b42e2373900b9c145a99b
-
SHA256
55fb7af7fa09cca06434d2f6ce71aa56952b5b574da1d6a728b1ca7fb36ca4cc
-
SHA512
cba31af01eb4e230417ebed5939b8264d7de12b56ed401da696a7abec7de9519b05c1a753277717d07db72b17a7320d552fdb92ed720e9ca784a7288fb561d57
-
SSDEEP
24576:Dy0vHhhg4mMGr76WbnBijXUhviX1eoVh9UjKVdWAW:W0JG4mjBizUhq4oVDUjmdWA
Static task
static1
Behavioral task
behavioral1
Sample
55fb7af7fa09cca06434d2f6ce71aa56952b5b574da1d6a728b1ca7fb36ca4cc.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
55fb7af7fa09cca06434d2f6ce71aa56952b5b574da1d6a728b1ca7fb36ca4cc
-
Size
943KB
-
MD5
be8c4039185fe2289d253886372d1457
-
SHA1
060be3703d851fbcdd9b42e2373900b9c145a99b
-
SHA256
55fb7af7fa09cca06434d2f6ce71aa56952b5b574da1d6a728b1ca7fb36ca4cc
-
SHA512
cba31af01eb4e230417ebed5939b8264d7de12b56ed401da696a7abec7de9519b05c1a753277717d07db72b17a7320d552fdb92ed720e9ca784a7288fb561d57
-
SSDEEP
24576:Dy0vHhhg4mMGr76WbnBijXUhviX1eoVh9UjKVdWAW:W0JG4mjBizUhq4oVDUjmdWA
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1