General
-
Target
f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe
-
Size
767KB
-
Sample
241119-lz5chaypem
-
MD5
446204a6417c6fcca323c3a21fb86850
-
SHA1
ff885b0ca1f6e613960e2110dac11aea16d22f17
-
SHA256
f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5
-
SHA512
cdfd616c1f7bd7d217b7d21c89a6bf2896bd44002c4c961f58ce1e8a7e54e4f12c21aa0624862f5a642a2d33e8315fd81eafb471d7a09602338a86d61fa3fcad
-
SSDEEP
12288:Ry90kyWn9YR7iUFLvvYtpjl+5ovp4XXGsEFyK6ub268FwNUL1Q:RyPd9YR2U1Qt9PaXWNDswNUZQ
Static task
static1
Behavioral task
behavioral1
Sample
f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5N.exe
-
Size
767KB
-
MD5
446204a6417c6fcca323c3a21fb86850
-
SHA1
ff885b0ca1f6e613960e2110dac11aea16d22f17
-
SHA256
f2739a2887c473b9c0d85d16f5abff7a3d10321471326b9ab59a11f39bdd7aa5
-
SHA512
cdfd616c1f7bd7d217b7d21c89a6bf2896bd44002c4c961f58ce1e8a7e54e4f12c21aa0624862f5a642a2d33e8315fd81eafb471d7a09602338a86d61fa3fcad
-
SSDEEP
12288:Ry90kyWn9YR7iUFLvvYtpjl+5ovp4XXGsEFyK6ub268FwNUL1Q:RyPd9YR2U1Qt9PaXWNDswNUZQ
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1