General
-
Target
7bcf2806d0c2ba5fae609d6d6d8646096dede3830d703625b5c591f225430977N.exe
-
Size
624KB
-
Sample
241119-xqpq8s1dnl
-
MD5
9f2e696c5d7a1b50f8d6945021d11fa0
-
SHA1
2a660c1f9992387dfbc7716d8298ba38d3889c29
-
SHA256
7bcf2806d0c2ba5fae609d6d6d8646096dede3830d703625b5c591f225430977
-
SHA512
573813842bb0513076ef2e8bf3913c2e2a2b54cdbf16aed5f8ef8e760aa5b02715d8e43ae3a1f984763346678959d999e8f776a2554387582938d87bace98eb1
-
SSDEEP
12288:sy90mvyjAXGOzfeDZWswe1hIbZlg73R/KGOJi0mgU:sy1yjaGMe1j38jgNiGOsrgU
Static task
static1
Behavioral task
behavioral1
Sample
7bcf2806d0c2ba5fae609d6d6d8646096dede3830d703625b5c591f225430977N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7bcf2806d0c2ba5fae609d6d6d8646096dede3830d703625b5c591f225430977N.exe
-
Size
624KB
-
MD5
9f2e696c5d7a1b50f8d6945021d11fa0
-
SHA1
2a660c1f9992387dfbc7716d8298ba38d3889c29
-
SHA256
7bcf2806d0c2ba5fae609d6d6d8646096dede3830d703625b5c591f225430977
-
SHA512
573813842bb0513076ef2e8bf3913c2e2a2b54cdbf16aed5f8ef8e760aa5b02715d8e43ae3a1f984763346678959d999e8f776a2554387582938d87bace98eb1
-
SSDEEP
12288:sy90mvyjAXGOzfeDZWswe1hIbZlg73R/KGOJi0mgU:sy1yjaGMe1j38jgNiGOsrgU
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1