General
-
Target
7f1f65592c3414b5d2592b29968a85a3f99eca3ec5a6b6c4059759afff02a535.exe
-
Size
568KB
-
Sample
241119-3lr9fsvpd1
-
MD5
a744ad560e3e37ef57c8365727d3f360
-
SHA1
ecb376177da786f7c0af43bae55cdf1641d68972
-
SHA256
7f1f65592c3414b5d2592b29968a85a3f99eca3ec5a6b6c4059759afff02a535
-
SHA512
a9fbb6cc1ec3bbd3deb0125995a6199a3951ebbbbe0813467b28c14d329dd128037fb4ce01391f81284cca29bbe2c4325a732a9f1eda135d33b259254a8841fa
-
SSDEEP
12288:ky90wNAu5p6Cniz5BvffCv8lf4mKixyhe5:kyR75p6siz5BvffCIh5xys5
Static task
static1
Behavioral task
behavioral1
Sample
7f1f65592c3414b5d2592b29968a85a3f99eca3ec5a6b6c4059759afff02a535.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7f1f65592c3414b5d2592b29968a85a3f99eca3ec5a6b6c4059759afff02a535.exe
-
Size
568KB
-
MD5
a744ad560e3e37ef57c8365727d3f360
-
SHA1
ecb376177da786f7c0af43bae55cdf1641d68972
-
SHA256
7f1f65592c3414b5d2592b29968a85a3f99eca3ec5a6b6c4059759afff02a535
-
SHA512
a9fbb6cc1ec3bbd3deb0125995a6199a3951ebbbbe0813467b28c14d329dd128037fb4ce01391f81284cca29bbe2c4325a732a9f1eda135d33b259254a8841fa
-
SSDEEP
12288:ky90wNAu5p6Cniz5BvffCv8lf4mKixyhe5:kyR75p6siz5BvffCIh5xys5
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1