General
-
Target
bff1d32feae889e1cf4c525385a796984d4ee224071a96fcc2aa60a363a316d8.exe
-
Size
625KB
-
Sample
241119-j968qstarq
-
MD5
524456aecf3755e2d31b023219f42db3
-
SHA1
3b474437609417b3711dc570c5a96ea67203ea1d
-
SHA256
bff1d32feae889e1cf4c525385a796984d4ee224071a96fcc2aa60a363a316d8
-
SHA512
c8a99d5fa81bd5b90885e6b11d5426cd42700a21b339bca51f4c1c4ffefe22a8f08a874cb92355a869c0e7534e831014c4c7c239458eeef1b7ca5f18b718ab79
-
SSDEEP
12288:Py90L2JRhmFXu4jdn6UgBpaullbahg7uRnQ2sD6jGSfs:Pyq2jhiuQn6UgVltYgAQ2soRs
Static task
static1
Behavioral task
behavioral1
Sample
bff1d32feae889e1cf4c525385a796984d4ee224071a96fcc2aa60a363a316d8.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bff1d32feae889e1cf4c525385a796984d4ee224071a96fcc2aa60a363a316d8.exe
-
Size
625KB
-
MD5
524456aecf3755e2d31b023219f42db3
-
SHA1
3b474437609417b3711dc570c5a96ea67203ea1d
-
SHA256
bff1d32feae889e1cf4c525385a796984d4ee224071a96fcc2aa60a363a316d8
-
SHA512
c8a99d5fa81bd5b90885e6b11d5426cd42700a21b339bca51f4c1c4ffefe22a8f08a874cb92355a869c0e7534e831014c4c7c239458eeef1b7ca5f18b718ab79
-
SSDEEP
12288:Py90L2JRhmFXu4jdn6UgBpaullbahg7uRnQ2sD6jGSfs:Pyq2jhiuQn6UgVltYgAQ2soRs
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1