General
-
Target
45d9ed677ae9470dab488df3c3aa41a882034ae254474e9ccfae954b7b9002bfN.exe
-
Size
624KB
-
Sample
241119-jxy2laxlap
-
MD5
b0536b2217c7ab486cad273955c51400
-
SHA1
e789088bdddae0468eb8453a3619f298cd9dbd77
-
SHA256
45d9ed677ae9470dab488df3c3aa41a882034ae254474e9ccfae954b7b9002bf
-
SHA512
a6ee7a50d22b9328513a2aa5cd2120f23967baf5648a891077000d1d0bf1be61fc9120d3132478d0c63305ec75be4a82e86b2996a5e0dd39398060fa6b98adc3
-
SSDEEP
12288:Oy90nsisWKSkmV6aUQ9mRmJ8oebe9g7ERujFN0y+A1B6wx:Oyj0V6aUQ9mc6Mguc+mB9x
Static task
static1
Behavioral task
behavioral1
Sample
45d9ed677ae9470dab488df3c3aa41a882034ae254474e9ccfae954b7b9002bfN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
45d9ed677ae9470dab488df3c3aa41a882034ae254474e9ccfae954b7b9002bfN.exe
-
Size
624KB
-
MD5
b0536b2217c7ab486cad273955c51400
-
SHA1
e789088bdddae0468eb8453a3619f298cd9dbd77
-
SHA256
45d9ed677ae9470dab488df3c3aa41a882034ae254474e9ccfae954b7b9002bf
-
SHA512
a6ee7a50d22b9328513a2aa5cd2120f23967baf5648a891077000d1d0bf1be61fc9120d3132478d0c63305ec75be4a82e86b2996a5e0dd39398060fa6b98adc3
-
SSDEEP
12288:Oy90nsisWKSkmV6aUQ9mRmJ8oebe9g7ERujFN0y+A1B6wx:Oyj0V6aUQ9mc6Mguc+mB9x
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1