General
-
Target
35fd8cedbff5cc350194a431237228b410f68a97bd303dd4686100aee878517a.exe
-
Size
470KB
-
Sample
241119-msmpjsvbla
-
MD5
58a036c473bbbe7ae83457920044e7a4
-
SHA1
87dff4864fc8eb34f381591055bf8e1e237a9a23
-
SHA256
35fd8cedbff5cc350194a431237228b410f68a97bd303dd4686100aee878517a
-
SHA512
986f2ab50b2aa5adcac80cbbc717e9b01dec3a6731bc78c7dd885908db8aae8ef160caa32d3a0583c5ceef8f66fe4c7bd2111d19b32315881d8066e2651d3b65
-
SSDEEP
6144:btp0yN90QEbBIUjqWhpdmRFFwdKpeKKXnLfq3baQbayukk17+8GVdxhSOJBkc:Uy908UqGPAFzM3Ly3bRPg7+RJsc
Static task
static1
Behavioral task
behavioral1
Sample
35fd8cedbff5cc350194a431237228b410f68a97bd303dd4686100aee878517a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
35fd8cedbff5cc350194a431237228b410f68a97bd303dd4686100aee878517a.exe
-
Size
470KB
-
MD5
58a036c473bbbe7ae83457920044e7a4
-
SHA1
87dff4864fc8eb34f381591055bf8e1e237a9a23
-
SHA256
35fd8cedbff5cc350194a431237228b410f68a97bd303dd4686100aee878517a
-
SHA512
986f2ab50b2aa5adcac80cbbc717e9b01dec3a6731bc78c7dd885908db8aae8ef160caa32d3a0583c5ceef8f66fe4c7bd2111d19b32315881d8066e2651d3b65
-
SSDEEP
6144:btp0yN90QEbBIUjqWhpdmRFFwdKpeKKXnLfq3baQbayukk17+8GVdxhSOJBkc:Uy908UqGPAFzM3Ly3bRPg7+RJsc
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1