General
-
Target
702ba0918ba09c30862f24a97793ee1b7d6a61bf5dc91ccb06b9f5ba53423957.exe
-
Size
568KB
-
Sample
241119-b4hzysybqg
-
MD5
eb0e8f6c748997db0ce829249f800507
-
SHA1
576be9bc68f59170ef1a2fa86c83bbd36dcbfaf1
-
SHA256
702ba0918ba09c30862f24a97793ee1b7d6a61bf5dc91ccb06b9f5ba53423957
-
SHA512
51ab0a4e5dfcfc2bb5d4db31843c8c11cf4bbfa53b832194276f7a9db8371e702fad27fb9eef4dc099ceeeedca1810e83d16799c191d6384e560f628b67bc08c
-
SSDEEP
12288:iy90o14Qudgv1Dx9ItxE9JaOXkg6/PV81lBwzo/rC+I:iyb4l+1wEPxyOBuoTC+I
Static task
static1
Behavioral task
behavioral1
Sample
702ba0918ba09c30862f24a97793ee1b7d6a61bf5dc91ccb06b9f5ba53423957.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
702ba0918ba09c30862f24a97793ee1b7d6a61bf5dc91ccb06b9f5ba53423957.exe
-
Size
568KB
-
MD5
eb0e8f6c748997db0ce829249f800507
-
SHA1
576be9bc68f59170ef1a2fa86c83bbd36dcbfaf1
-
SHA256
702ba0918ba09c30862f24a97793ee1b7d6a61bf5dc91ccb06b9f5ba53423957
-
SHA512
51ab0a4e5dfcfc2bb5d4db31843c8c11cf4bbfa53b832194276f7a9db8371e702fad27fb9eef4dc099ceeeedca1810e83d16799c191d6384e560f628b67bc08c
-
SSDEEP
12288:iy90o14Qudgv1Dx9ItxE9JaOXkg6/PV81lBwzo/rC+I:iyb4l+1wEPxyOBuoTC+I
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1