General
-
Target
650b71691e96d60725ff212fcc6006b7d2ecabb5d54a3e9f228ed1dbfb37a84d
-
Size
549KB
-
Sample
241122-3bvltsxqhq
-
MD5
f003e9a3df6721a62f62ebb540676fc3
-
SHA1
0fd34245cc8f8e21cf9ff1a4ad18235f4954214d
-
SHA256
650b71691e96d60725ff212fcc6006b7d2ecabb5d54a3e9f228ed1dbfb37a84d
-
SHA512
0a0c19a47ead11a72431ac8c888b1d9d754ac1ed51dfaf60622e1195c5ecd7a22c853366cc922e789f7e4eddd844ca85bce35051c750b7014fba87484dcb7bd5
-
SSDEEP
12288:jy907OSFow/vSLnBl6I9LGuDMuzbwori:jy8OSv/ol6I1GQti
Static task
static1
Behavioral task
behavioral1
Sample
650b71691e96d60725ff212fcc6006b7d2ecabb5d54a3e9f228ed1dbfb37a84d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
650b71691e96d60725ff212fcc6006b7d2ecabb5d54a3e9f228ed1dbfb37a84d
-
Size
549KB
-
MD5
f003e9a3df6721a62f62ebb540676fc3
-
SHA1
0fd34245cc8f8e21cf9ff1a4ad18235f4954214d
-
SHA256
650b71691e96d60725ff212fcc6006b7d2ecabb5d54a3e9f228ed1dbfb37a84d
-
SHA512
0a0c19a47ead11a72431ac8c888b1d9d754ac1ed51dfaf60622e1195c5ecd7a22c853366cc922e789f7e4eddd844ca85bce35051c750b7014fba87484dcb7bd5
-
SSDEEP
12288:jy907OSFow/vSLnBl6I9LGuDMuzbwori:jy8OSv/ol6I1GQti
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1