General
-
Target
70a8020c3f7837ab839a1667c0c0892aa4f1400fbade4c81605915a82ba577d4N.exe
-
Size
415KB
-
Sample
241118-x3kytatjdy
-
MD5
b373bc464dbc89ec18232cc817aa9f70
-
SHA1
161f7a9c91079cc649c1290c2921ee9d4420cf39
-
SHA256
70a8020c3f7837ab839a1667c0c0892aa4f1400fbade4c81605915a82ba577d4
-
SHA512
82b34f6d3db3c3154c92781e65154b0313b2a64ef8346904074214ca4b102eec487f74b4c7a6b6a47bbd4df9e65cd675c52d956198133c1427d1632f8132e8f0
-
SSDEEP
6144:pQp0yN90QEd13lwkO7Am8ghNHpVyKcL0Ie0P0hK3x97mY5NxSQXJDctw:fy90j13lw70mp4v3eq0hlw/ZDctw
Static task
static1
Behavioral task
behavioral1
Sample
70a8020c3f7837ab839a1667c0c0892aa4f1400fbade4c81605915a82ba577d4N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
70a8020c3f7837ab839a1667c0c0892aa4f1400fbade4c81605915a82ba577d4N.exe
-
Size
415KB
-
MD5
b373bc464dbc89ec18232cc817aa9f70
-
SHA1
161f7a9c91079cc649c1290c2921ee9d4420cf39
-
SHA256
70a8020c3f7837ab839a1667c0c0892aa4f1400fbade4c81605915a82ba577d4
-
SHA512
82b34f6d3db3c3154c92781e65154b0313b2a64ef8346904074214ca4b102eec487f74b4c7a6b6a47bbd4df9e65cd675c52d956198133c1427d1632f8132e8f0
-
SSDEEP
6144:pQp0yN90QEd13lwkO7Am8ghNHpVyKcL0Ie0P0hK3x97mY5NxSQXJDctw:fy90j13lw70mp4v3eq0hlw/ZDctw
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1