General
-
Target
485fcbc88321f7a61cb1c561dbd87b15aec3afa6c4f6668280dba49cb2df6760.exe
-
Size
569KB
-
Sample
241124-rndcjazlep
-
MD5
53123dcdd6257f63e68b822f29fc7598
-
SHA1
3fdb608df76a4272edaab10ff741df0c3e0d07cb
-
SHA256
485fcbc88321f7a61cb1c561dbd87b15aec3afa6c4f6668280dba49cb2df6760
-
SHA512
e72014ea8ed18f631e9996c819b92205d55d55ef01ffeaa93acc7e77e0d6c8ba21683010279262a441f210fbb6cd1e8815fbc4b818abc429415c3f8026af9804
-
SSDEEP
12288:jy90um24F2aaLtxbTLBTcBJeiMGGhweXgTpo9:jylm2q1apZZABJeiMHdg9o9
Static task
static1
Behavioral task
behavioral1
Sample
485fcbc88321f7a61cb1c561dbd87b15aec3afa6c4f6668280dba49cb2df6760.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
485fcbc88321f7a61cb1c561dbd87b15aec3afa6c4f6668280dba49cb2df6760.exe
-
Size
569KB
-
MD5
53123dcdd6257f63e68b822f29fc7598
-
SHA1
3fdb608df76a4272edaab10ff741df0c3e0d07cb
-
SHA256
485fcbc88321f7a61cb1c561dbd87b15aec3afa6c4f6668280dba49cb2df6760
-
SHA512
e72014ea8ed18f631e9996c819b92205d55d55ef01ffeaa93acc7e77e0d6c8ba21683010279262a441f210fbb6cd1e8815fbc4b818abc429415c3f8026af9804
-
SSDEEP
12288:jy90um24F2aaLtxbTLBTcBJeiMGGhweXgTpo9:jylm2q1apZZABJeiMHdg9o9
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1