General
-
Target
a355df148b11d386b6ff08dfc09fdd578da86d07f5b6b6b7fdcf84ff2b55e2e8N.exe
-
Size
609KB
-
Sample
241119-mq78gazkfp
-
MD5
069b1005d0cdd4b0d788056ad87d1290
-
SHA1
85e7139fe2c0d9896b3225f0604d4caf1aeb1819
-
SHA256
a355df148b11d386b6ff08dfc09fdd578da86d07f5b6b6b7fdcf84ff2b55e2e8
-
SHA512
8e85efac7820dc7872ae51c41c7beba930e94e8b226eace52880f5a08c90cae9d177ff574b538f135a8d66cc4e67a87287bd2b6114ea528c02b1f59574c65c4a
-
SSDEEP
12288:iy90+JPdEB9WGK9BpbHz3BJcdjGbn6PbZJgxEaR/n:iy5PdEPkpzzRJcAD6jrgzxn
Static task
static1
Behavioral task
behavioral1
Sample
a355df148b11d386b6ff08dfc09fdd578da86d07f5b6b6b7fdcf84ff2b55e2e8N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a355df148b11d386b6ff08dfc09fdd578da86d07f5b6b6b7fdcf84ff2b55e2e8N.exe
-
Size
609KB
-
MD5
069b1005d0cdd4b0d788056ad87d1290
-
SHA1
85e7139fe2c0d9896b3225f0604d4caf1aeb1819
-
SHA256
a355df148b11d386b6ff08dfc09fdd578da86d07f5b6b6b7fdcf84ff2b55e2e8
-
SHA512
8e85efac7820dc7872ae51c41c7beba930e94e8b226eace52880f5a08c90cae9d177ff574b538f135a8d66cc4e67a87287bd2b6114ea528c02b1f59574c65c4a
-
SSDEEP
12288:iy90+JPdEB9WGK9BpbHz3BJcdjGbn6PbZJgxEaR/n:iy5PdEPkpzzRJcAD6jrgzxn
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1