General
-
Target
1b56e953b15921b1d196c0785739a6d1689023a4b9cc94609bec1d046a67410cN.exe
-
Size
568KB
-
Sample
241119-b8dk2aymax
-
MD5
a7713a3e45bde1086b5f01355cda56d0
-
SHA1
5ccc4ebdc090088f12a27be3ac6de2c4e22cd253
-
SHA256
1b56e953b15921b1d196c0785739a6d1689023a4b9cc94609bec1d046a67410c
-
SHA512
101ae8c241cfccafdbae2ffd89f45905b3f99cc6e83437401ef02228277558f1788bd5104e8dde86bea9041ddc9461ea1ca9c3b49ecae57b49112a4195dceb60
-
SSDEEP
6144:Q5p0yN90QEHo6idoWBA/kiazpryJ2mMghKBxFJeZBmKWUceCI3Qu9wR3pWzHshHD:3y90+6aVyJrMghKGxrjFwRjHW4jJ
Static task
static1
Behavioral task
behavioral1
Sample
1b56e953b15921b1d196c0785739a6d1689023a4b9cc94609bec1d046a67410cN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1b56e953b15921b1d196c0785739a6d1689023a4b9cc94609bec1d046a67410cN.exe
-
Size
568KB
-
MD5
a7713a3e45bde1086b5f01355cda56d0
-
SHA1
5ccc4ebdc090088f12a27be3ac6de2c4e22cd253
-
SHA256
1b56e953b15921b1d196c0785739a6d1689023a4b9cc94609bec1d046a67410c
-
SHA512
101ae8c241cfccafdbae2ffd89f45905b3f99cc6e83437401ef02228277558f1788bd5104e8dde86bea9041ddc9461ea1ca9c3b49ecae57b49112a4195dceb60
-
SSDEEP
6144:Q5p0yN90QEHo6idoWBA/kiazpryJ2mMghKBxFJeZBmKWUceCI3Qu9wR3pWzHshHD:3y90+6aVyJrMghKGxrjFwRjHW4jJ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1