General
-
Target
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44
-
Size
707KB
-
Sample
241122-bbkm3s1kes
-
MD5
2a44568c7e2f68b5861b2a494c780682
-
SHA1
d6a3a8972455ebc491d84179e2b4c1b6165a7c2b
-
SHA256
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44
-
SHA512
490827aeebc5fd4fc9b0e21c71fb9e64be6480ef7f73114c3ed27d2ec7b454c04fd71ef0a559f8b9b395951ac668d8b89e01f755d78beb8bfb68d3e0209374ee
-
SSDEEP
12288:iy903zQ0H3fIApMRE6KjJJokBkILjuaSUjdXtYBncIKApDDwKvPyK:iycQ0XwAIERjJbBpTSU9qn8ApDDwKvaK
Static task
static1
Behavioral task
behavioral1
Sample
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44
-
Size
707KB
-
MD5
2a44568c7e2f68b5861b2a494c780682
-
SHA1
d6a3a8972455ebc491d84179e2b4c1b6165a7c2b
-
SHA256
761b9a5fb212d63fa686604c4ee76769475d0d3fea554ee47ffea820e81e9a44
-
SHA512
490827aeebc5fd4fc9b0e21c71fb9e64be6480ef7f73114c3ed27d2ec7b454c04fd71ef0a559f8b9b395951ac668d8b89e01f755d78beb8bfb68d3e0209374ee
-
SSDEEP
12288:iy903zQ0H3fIApMRE6KjJJokBkILjuaSUjdXtYBncIKApDDwKvPyK:iycQ0XwAIERjJbBpTSU9qn8ApDDwKvaK
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1