General
-
Target
7dedf9a415949f0f4790367db5eaa4eb7df53f73c7a6b293305f2372e06f1d7a.exe
-
Size
412KB
-
Sample
241119-j8hhzsscrg
-
MD5
1eaba248c3613a520a99226ab1b2a6ed
-
SHA1
03259d7dd6daf0e238e76c1432fdf61de04d4d13
-
SHA256
7dedf9a415949f0f4790367db5eaa4eb7df53f73c7a6b293305f2372e06f1d7a
-
SHA512
4e6d4c07f7ed7d11561556c2b9aa5b5316644ea44fc7c6d6143f06565bb768e27bc969c3d34c75070b0c0afe853751cab661c4637ad8f0d919cd9be476e3ebdd
-
SSDEEP
12288:iy9074/yiYfTU+PfrF9miHZvsyIiNtLDbTPKZHx:iy7/+fTnfB9mi5vjD/EHx
Static task
static1
Behavioral task
behavioral1
Sample
7dedf9a415949f0f4790367db5eaa4eb7df53f73c7a6b293305f2372e06f1d7a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7dedf9a415949f0f4790367db5eaa4eb7df53f73c7a6b293305f2372e06f1d7a.exe
-
Size
412KB
-
MD5
1eaba248c3613a520a99226ab1b2a6ed
-
SHA1
03259d7dd6daf0e238e76c1432fdf61de04d4d13
-
SHA256
7dedf9a415949f0f4790367db5eaa4eb7df53f73c7a6b293305f2372e06f1d7a
-
SHA512
4e6d4c07f7ed7d11561556c2b9aa5b5316644ea44fc7c6d6143f06565bb768e27bc969c3d34c75070b0c0afe853751cab661c4637ad8f0d919cd9be476e3ebdd
-
SSDEEP
12288:iy9074/yiYfTU+PfrF9miHZvsyIiNtLDbTPKZHx:iy7/+fTnfB9mi5vjD/EHx
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1