General
-
Target
f7e4f74a66c0112efdc894066b69253f1a09dfc70310bec763a4e3da07faf549N.exe
-
Size
706KB
-
Sample
241126-hs1tysznby
-
MD5
bc4514e963a9909a0d1632d10687a920
-
SHA1
41f7aeb40a8dd41252d524b3c941f73b03e46eeb
-
SHA256
f7e4f74a66c0112efdc894066b69253f1a09dfc70310bec763a4e3da07faf549
-
SHA512
0c47f273b15082cd0259c258b458798c518e0a299ba8a798186b643ba25f6611b24695c075f2cfe275318648039609b240a9f843f4d75d88a3a9a2b4fb4c4c8b
-
SSDEEP
12288:Ly90fPqxOKqsTtsZT9dwiOpMzChsLJTFXO8I1MM38QQYXbnWJpF:Ly8PIOGts19WiOyxZFtM33bnWDF
Static task
static1
Behavioral task
behavioral1
Sample
f7e4f74a66c0112efdc894066b69253f1a09dfc70310bec763a4e3da07faf549N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f7e4f74a66c0112efdc894066b69253f1a09dfc70310bec763a4e3da07faf549N.exe
-
Size
706KB
-
MD5
bc4514e963a9909a0d1632d10687a920
-
SHA1
41f7aeb40a8dd41252d524b3c941f73b03e46eeb
-
SHA256
f7e4f74a66c0112efdc894066b69253f1a09dfc70310bec763a4e3da07faf549
-
SHA512
0c47f273b15082cd0259c258b458798c518e0a299ba8a798186b643ba25f6611b24695c075f2cfe275318648039609b240a9f843f4d75d88a3a9a2b4fb4c4c8b
-
SSDEEP
12288:Ly90fPqxOKqsTtsZT9dwiOpMzChsLJTFXO8I1MM38QQYXbnWJpF:Ly8PIOGts19WiOyxZFtM33bnWDF
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1