General
-
Target
59c2ee9ba6c43945928fe0432e1f13fd2c1cadd63f913cc1239ae332d2e8419d
-
Size
551KB
-
Sample
241122-abldyazpa1
-
MD5
6f1ceefbae657942229cdd669c431c16
-
SHA1
13a9e0b6fba1bdc0b83656f72c8d0971f2d410f7
-
SHA256
59c2ee9ba6c43945928fe0432e1f13fd2c1cadd63f913cc1239ae332d2e8419d
-
SHA512
b717d2172931bd60acac3fb8556e8acdfca9f88454e508752bff785e027ee59dcfae59e7041d7c124e1710d525dc66288fe24dc7c631efbe2ba7a91ddac6dbef
-
SSDEEP
12288:Jy900dLGWVEgl24sG2TGv0y9OBoT8IOSfTmQzY3bXHH:JyvLX2gAGf9pfT8bXHH
Static task
static1
Behavioral task
behavioral1
Sample
59c2ee9ba6c43945928fe0432e1f13fd2c1cadd63f913cc1239ae332d2e8419d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
59c2ee9ba6c43945928fe0432e1f13fd2c1cadd63f913cc1239ae332d2e8419d
-
Size
551KB
-
MD5
6f1ceefbae657942229cdd669c431c16
-
SHA1
13a9e0b6fba1bdc0b83656f72c8d0971f2d410f7
-
SHA256
59c2ee9ba6c43945928fe0432e1f13fd2c1cadd63f913cc1239ae332d2e8419d
-
SHA512
b717d2172931bd60acac3fb8556e8acdfca9f88454e508752bff785e027ee59dcfae59e7041d7c124e1710d525dc66288fe24dc7c631efbe2ba7a91ddac6dbef
-
SSDEEP
12288:Jy900dLGWVEgl24sG2TGv0y9OBoT8IOSfTmQzY3bXHH:JyvLX2gAGf9pfT8bXHH
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1