General
-
Target
NEAS.4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad_JC.exe
-
Size
1.0MB
-
Sample
231007-v37fpseb3s
-
MD5
f5314aad37f96f2528898fa31897db80
-
SHA1
cd71af513d2a68bb5d42375fd52034e2ae40ae07
-
SHA256
4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad
-
SHA512
289a0a901ea492383a68217c0891817e7143a3d9620e51ea2d25c7f3c5a226d77655008aac7de48502fe87e277053c6ba10674ee4c2c6d76ef014e3582ffd128
-
SSDEEP
24576:Hyu7JCRDLIpJuVDU9qno4vuHVKw5UaSW8Ek3nWQeQ6:SkJCRDL0J2o9qNvu1KwezzXWQN
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
narik
77.91.124.82:19071
-
auth_value
07924f5ef90576eb64faea857b8ba3e5
Targets
-
-
Target
NEAS.4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad_JC.exe
-
Size
1.0MB
-
MD5
f5314aad37f96f2528898fa31897db80
-
SHA1
cd71af513d2a68bb5d42375fd52034e2ae40ae07
-
SHA256
4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad
-
SHA512
289a0a901ea492383a68217c0891817e7143a3d9620e51ea2d25c7f3c5a226d77655008aac7de48502fe87e277053c6ba10674ee4c2c6d76ef014e3582ffd128
-
SSDEEP
24576:Hyu7JCRDLIpJuVDU9qno4vuHVKw5UaSW8Ek3nWQeQ6:SkJCRDL0J2o9qNvu1KwezzXWQN
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1