General
-
Target
5c91ce25384b538c074b34f52d88b08028729d005ddb1df64f16b0b9a3eda73d
-
Size
1.3MB
-
Sample
231011-k42lqsfb67
-
MD5
ee7f90bac057959a3592cef92907e521
-
SHA1
4e97c2e31075436c5be0264ff24a0035d5a06b67
-
SHA256
5c91ce25384b538c074b34f52d88b08028729d005ddb1df64f16b0b9a3eda73d
-
SHA512
719608539cc5a1507fc5432840471b5032bb198b5fb7f03d83341837f50ce931680d196cb12a70c59de775911a4518ac5af65683ebcafb23d1c87745d8fa4c5d
-
SSDEEP
24576:XyZPLYrNTUkm0uPAVqqQ0Ts+30haycr9M5jwlhJ5ee9jrP+Vc/AoU:ipL4Yt0uPMqYsGyhcG9ehTe8KV+b
Static task
static1
Behavioral task
behavioral1
Sample
5c91ce25384b538c074b34f52d88b08028729d005ddb1df64f16b0b9a3eda73d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5c91ce25384b538c074b34f52d88b08028729d005ddb1df64f16b0b9a3eda73d.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Targets
-
-
Target
5c91ce25384b538c074b34f52d88b08028729d005ddb1df64f16b0b9a3eda73d
-
Size
1.3MB
-
MD5
ee7f90bac057959a3592cef92907e521
-
SHA1
4e97c2e31075436c5be0264ff24a0035d5a06b67
-
SHA256
5c91ce25384b538c074b34f52d88b08028729d005ddb1df64f16b0b9a3eda73d
-
SHA512
719608539cc5a1507fc5432840471b5032bb198b5fb7f03d83341837f50ce931680d196cb12a70c59de775911a4518ac5af65683ebcafb23d1c87745d8fa4c5d
-
SSDEEP
24576:XyZPLYrNTUkm0uPAVqqQ0Ts+30haycr9M5jwlhJ5ee9jrP+Vc/AoU:ipL4Yt0uPMqYsGyhcG9ehTe8KV+b
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1