General
-
Target
82c8edabba211db77c0f0b71a274e782fa2ca4d4f5fcb5f9e4041daadebb3bccN.exe
-
Size
623KB
-
Sample
241119-qyrr8s1pbn
-
MD5
36b19aa2f3e76eec15fdf92bc280f500
-
SHA1
613d382d21a50b98f0872f287ad700d7a4bc5b92
-
SHA256
82c8edabba211db77c0f0b71a274e782fa2ca4d4f5fcb5f9e4041daadebb3bcc
-
SHA512
25802e03bab7a4455f26fe2540b6ff4feb06673a01b51b4d57553b006c60ece69412310fcce88090df5dcafcf09e4ee229d53ebfa3b8a27b43dbdc1061b4e372
-
SSDEEP
12288:Wy90Lk37iu+U7mb9Eab2zvp8uFBMAUEgOvS3:WyXZ7m9b27RBMAUEgV3
Static task
static1
Behavioral task
behavioral1
Sample
82c8edabba211db77c0f0b71a274e782fa2ca4d4f5fcb5f9e4041daadebb3bccN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
82c8edabba211db77c0f0b71a274e782fa2ca4d4f5fcb5f9e4041daadebb3bccN.exe
-
Size
623KB
-
MD5
36b19aa2f3e76eec15fdf92bc280f500
-
SHA1
613d382d21a50b98f0872f287ad700d7a4bc5b92
-
SHA256
82c8edabba211db77c0f0b71a274e782fa2ca4d4f5fcb5f9e4041daadebb3bcc
-
SHA512
25802e03bab7a4455f26fe2540b6ff4feb06673a01b51b4d57553b006c60ece69412310fcce88090df5dcafcf09e4ee229d53ebfa3b8a27b43dbdc1061b4e372
-
SSDEEP
12288:Wy90Lk37iu+U7mb9Eab2zvp8uFBMAUEgOvS3:WyXZ7m9b27RBMAUEgV3
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1