General
-
Target
b924015bd915b095874c8b514c0c6da46eaad54b2fb9ef263b74df992691b7d7
-
Size
1.0MB
-
Sample
231010-2ek15aff9x
-
MD5
7728d85c3179c1c528e3b7a1f0fcc951
-
SHA1
3c8584ade399efd68f61a750918e98bf36065b8f
-
SHA256
b924015bd915b095874c8b514c0c6da46eaad54b2fb9ef263b74df992691b7d7
-
SHA512
9750077bdb06897d8d8879437a9553ff4b6cc2e0909d55180296f5d66d26470347164e05466e1eeb7cae0348b9206d4ed746739042fcea94b48d0472114d8a3d
-
SSDEEP
24576:by7cFFGy4ejnch3cq51wlMFJxfXycI2lUKUDJwEM:OAM7ejns3cqHfXyT2OK8
Static task
static1
Behavioral task
behavioral1
Sample
b924015bd915b095874c8b514c0c6da46eaad54b2fb9ef263b74df992691b7d7.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Targets
-
-
Target
b924015bd915b095874c8b514c0c6da46eaad54b2fb9ef263b74df992691b7d7
-
Size
1.0MB
-
MD5
7728d85c3179c1c528e3b7a1f0fcc951
-
SHA1
3c8584ade399efd68f61a750918e98bf36065b8f
-
SHA256
b924015bd915b095874c8b514c0c6da46eaad54b2fb9ef263b74df992691b7d7
-
SHA512
9750077bdb06897d8d8879437a9553ff4b6cc2e0909d55180296f5d66d26470347164e05466e1eeb7cae0348b9206d4ed746739042fcea94b48d0472114d8a3d
-
SSDEEP
24576:by7cFFGy4ejnch3cq51wlMFJxfXycI2lUKUDJwEM:OAM7ejns3cqHfXyT2OK8
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1