General
-
Target
fee2c237760097b6770fb4b1ebd6c93e02bb408c054075757f91553809abe3c3.exe
-
Size
762KB
-
Sample
241124-pjmpasyqcz
-
MD5
731c1b9da616046c4b397d3948838d38
-
SHA1
00aa9cc61fe97a0007543aaac5618688aeeba11f
-
SHA256
fee2c237760097b6770fb4b1ebd6c93e02bb408c054075757f91553809abe3c3
-
SHA512
7d4ae5ae4361ceace0772b872ea9bf68a78c41f2b384e0ab1d4d39596000f5c95ccc3e326dcd98cf118525209ce13d096e90fc6e5fa924d84772ebb53fb7e58f
-
SSDEEP
12288:Iy90aKeUzw82OB1obc4H3UzMzS2Hlq9s4xK8Owx548X9D2MFNUcwY:Iy8e8w8X1v2//Hlqy4pOO48X/UcwY
Static task
static1
Behavioral task
behavioral1
Sample
fee2c237760097b6770fb4b1ebd6c93e02bb408c054075757f91553809abe3c3.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fee2c237760097b6770fb4b1ebd6c93e02bb408c054075757f91553809abe3c3.exe
-
Size
762KB
-
MD5
731c1b9da616046c4b397d3948838d38
-
SHA1
00aa9cc61fe97a0007543aaac5618688aeeba11f
-
SHA256
fee2c237760097b6770fb4b1ebd6c93e02bb408c054075757f91553809abe3c3
-
SHA512
7d4ae5ae4361ceace0772b872ea9bf68a78c41f2b384e0ab1d4d39596000f5c95ccc3e326dcd98cf118525209ce13d096e90fc6e5fa924d84772ebb53fb7e58f
-
SSDEEP
12288:Iy90aKeUzw82OB1obc4H3UzMzS2Hlq9s4xK8Owx548X9D2MFNUcwY:Iy8e8w8X1v2//Hlqy4pOO48X/UcwY
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1