General
-
Target
7e86a25705442d7dc0c21e74f30e38f05c568c04c4a524bde82880fd8110e6ae.exe
-
Size
469KB
-
Sample
241119-b3sg1azbjl
-
MD5
154755ed68d389f47e65aac8da602a51
-
SHA1
b1c138e0702946f565ce4c42388b0396cc90b49e
-
SHA256
7e86a25705442d7dc0c21e74f30e38f05c568c04c4a524bde82880fd8110e6ae
-
SHA512
1702fa43409b33e349af38c9dde854065afad881842f3bef87bcdf61115ba6668dbf3525f469773562cee87d488418c3956e4c492a49c2c429d004b1ce6e1946
-
SSDEEP
6144:/Ap0yN90QEZsRVLJlq1AN+CdwcbwhPVvgrUXlBfiPttQYC2MKYNWDaYFVwxddtq:Zy90P8dJlF+48FVvJiPntMKUYF6xddtq
Static task
static1
Behavioral task
behavioral1
Sample
7e86a25705442d7dc0c21e74f30e38f05c568c04c4a524bde82880fd8110e6ae.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7e86a25705442d7dc0c21e74f30e38f05c568c04c4a524bde82880fd8110e6ae.exe
-
Size
469KB
-
MD5
154755ed68d389f47e65aac8da602a51
-
SHA1
b1c138e0702946f565ce4c42388b0396cc90b49e
-
SHA256
7e86a25705442d7dc0c21e74f30e38f05c568c04c4a524bde82880fd8110e6ae
-
SHA512
1702fa43409b33e349af38c9dde854065afad881842f3bef87bcdf61115ba6668dbf3525f469773562cee87d488418c3956e4c492a49c2c429d004b1ce6e1946
-
SSDEEP
6144:/Ap0yN90QEZsRVLJlq1AN+CdwcbwhPVvgrUXlBfiPttQYC2MKYNWDaYFVwxddtq:Zy90P8dJlF+48FVvJiPntMKUYF6xddtq
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1