General
-
Target
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9
-
Size
1.0MB
-
Sample
231011-ll2pfsgc46
-
MD5
db8acd5be8a7c44b2ba095f8b7a0e4ca
-
SHA1
c76e2e44da677d0125552be5854446a38245783a
-
SHA256
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9
-
SHA512
417bee2b74914c8e304254ec7b346a18e8d053a6ca834378b32e380531d48373de4c31377855318574bc84bf763a8aba58c3b18113d42358390936110f839f36
-
SSDEEP
24576:4yx+FdLEae5sGpHBqDB57wt/TEKt4xi2xaF+yP:/gFdwae5sGHg7wTvOximaF
Static task
static1
Behavioral task
behavioral1
Sample
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Targets
-
-
Target
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9
-
Size
1.0MB
-
MD5
db8acd5be8a7c44b2ba095f8b7a0e4ca
-
SHA1
c76e2e44da677d0125552be5854446a38245783a
-
SHA256
d5d1cae55a737e316876dc550daf8b18e5a28ba32c4b23531dfd2d8cd83c8fb9
-
SHA512
417bee2b74914c8e304254ec7b346a18e8d053a6ca834378b32e380531d48373de4c31377855318574bc84bf763a8aba58c3b18113d42358390936110f839f36
-
SSDEEP
24576:4yx+FdLEae5sGpHBqDB57wt/TEKt4xi2xaF+yP:/gFdwae5sGHg7wTvOximaF
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1