General
-
Target
7c21fd6fb169d393a63c4e4c84cf4ab4e527aeec18820b61d4d4cd73348d6091.exe
-
Size
469KB
-
Sample
241119-tvhxpsyfpm
-
MD5
d7e4a094e356a803d7f43c3ad259e7e6
-
SHA1
484907b7bff0d032a33c069a5001460c74621216
-
SHA256
7c21fd6fb169d393a63c4e4c84cf4ab4e527aeec18820b61d4d4cd73348d6091
-
SHA512
694a777d915a4770391c30be96df2ce06b23b6f1ebece748819c98a6e01e1900ce453631715714e6e4b7bbe45e6006c1d81a1fb5b054487de95a8f9bcd9f32a6
-
SSDEEP
6144:gBp0yN90QEwyEPOJ0qjEPPprsYEacBh/qubUR5XvU/p9xVLIp7pfzMn8:Ly906y9cx6BhiuaRc/p9x18
Static task
static1
Behavioral task
behavioral1
Sample
7c21fd6fb169d393a63c4e4c84cf4ab4e527aeec18820b61d4d4cd73348d6091.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7c21fd6fb169d393a63c4e4c84cf4ab4e527aeec18820b61d4d4cd73348d6091.exe
-
Size
469KB
-
MD5
d7e4a094e356a803d7f43c3ad259e7e6
-
SHA1
484907b7bff0d032a33c069a5001460c74621216
-
SHA256
7c21fd6fb169d393a63c4e4c84cf4ab4e527aeec18820b61d4d4cd73348d6091
-
SHA512
694a777d915a4770391c30be96df2ce06b23b6f1ebece748819c98a6e01e1900ce453631715714e6e4b7bbe45e6006c1d81a1fb5b054487de95a8f9bcd9f32a6
-
SSDEEP
6144:gBp0yN90QEwyEPOJ0qjEPPprsYEacBh/qubUR5XvU/p9xVLIp7pfzMn8:Ly906y9cx6BhiuaRc/p9x18
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1