General
-
Target
0e82587ee4e83620d02b67717663fd0ee8a4a9e27f5ac5fb5a4f6a0340fffaea.exe
-
Size
762KB
-
Sample
241118-ydvmdstley
-
MD5
1de2df9fb12e65d9ed503038ac2a5115
-
SHA1
93a4e6c4a22a9aef6432e50ba20de33a816454f0
-
SHA256
0e82587ee4e83620d02b67717663fd0ee8a4a9e27f5ac5fb5a4f6a0340fffaea
-
SHA512
9f47969633a94111a18cf28399b1f74ba866fc060c95d0fb9e06bb305e3e5a5c0f3c10b14c64eb227a58c2163c3125bc3cfdcb54023947a35d7df621aa4b88c7
-
SSDEEP
12288:Jy90/qjyGppsWA338zK0Kvw+AnPkkKwMh78mqmqAPLuM7cx0Z90LQ4:JyOyjTq8W25P6wMhgB9AjuucCv4
Static task
static1
Behavioral task
behavioral1
Sample
0e82587ee4e83620d02b67717663fd0ee8a4a9e27f5ac5fb5a4f6a0340fffaea.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0e82587ee4e83620d02b67717663fd0ee8a4a9e27f5ac5fb5a4f6a0340fffaea.exe
-
Size
762KB
-
MD5
1de2df9fb12e65d9ed503038ac2a5115
-
SHA1
93a4e6c4a22a9aef6432e50ba20de33a816454f0
-
SHA256
0e82587ee4e83620d02b67717663fd0ee8a4a9e27f5ac5fb5a4f6a0340fffaea
-
SHA512
9f47969633a94111a18cf28399b1f74ba866fc060c95d0fb9e06bb305e3e5a5c0f3c10b14c64eb227a58c2163c3125bc3cfdcb54023947a35d7df621aa4b88c7
-
SSDEEP
12288:Jy90/qjyGppsWA338zK0Kvw+AnPkkKwMh78mqmqAPLuM7cx0Z90LQ4:JyOyjTq8W25P6wMhgB9AjuucCv4
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1