General
-
Target
02d74762993fda96c0af1c7609f58b946d7b81b6903b86432c38e5b165e9eb64N.exe
-
Size
569KB
-
Sample
241124-rpnjwszlhr
-
MD5
a0673fe0c9f774a48baa9e2ad5bac550
-
SHA1
c9644cd6797a19785fb2fca5343da758fedceed0
-
SHA256
02d74762993fda96c0af1c7609f58b946d7b81b6903b86432c38e5b165e9eb64
-
SHA512
ae73564571467837099f817a856e5af41bf4c2e059115f2766785e20b1a689803b85fe4096c6a489d2bd3f1ec2199511a6750cb59044a97742a76e7c0fcc5624
-
SSDEEP
12288:jy90um24F2aaLtxbTLBTcBJeiMGGhweXgTpo:jylm2q1apZZABJeiMHdg9o
Static task
static1
Behavioral task
behavioral1
Sample
02d74762993fda96c0af1c7609f58b946d7b81b6903b86432c38e5b165e9eb64N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
02d74762993fda96c0af1c7609f58b946d7b81b6903b86432c38e5b165e9eb64N.exe
-
Size
569KB
-
MD5
a0673fe0c9f774a48baa9e2ad5bac550
-
SHA1
c9644cd6797a19785fb2fca5343da758fedceed0
-
SHA256
02d74762993fda96c0af1c7609f58b946d7b81b6903b86432c38e5b165e9eb64
-
SHA512
ae73564571467837099f817a856e5af41bf4c2e059115f2766785e20b1a689803b85fe4096c6a489d2bd3f1ec2199511a6750cb59044a97742a76e7c0fcc5624
-
SSDEEP
12288:jy90um24F2aaLtxbTLBTcBJeiMGGhweXgTpo:jylm2q1apZZABJeiMHdg9o
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1