General
-
Target
9e2d86d04cb20e3d5b557cd71115e1145754ca4a10dc32495ef3af9367b6e6cc
-
Size
1018KB
-
Sample
231011-lsp91aeg3s
-
MD5
ca5029e32f9a8de98228ee041075e5d5
-
SHA1
4f854f0f19afc3695df8c8612e9c8329acccd2b5
-
SHA256
04596b971b39c0ef3235fa01cf8292bc1c57cc795d1cba5f6df499683e825a2a
-
SHA512
c8970c33ffc1f43b4b8cfaf5142e424d217ad53eac3fc86abbf7af51935483b86a7add7f8626c5c342499f0f089b4e78e044143496f09b3ad5605e00c07b9317
-
SSDEEP
24576:OwEP1MyTOajt6jrh6tapo+Uq1V+9xrKdVUUHUHj:5iTHAjtWapoqV+9VKzUUHUD
Static task
static1
Behavioral task
behavioral1
Sample
9e2d86d04cb20e3d5b557cd71115e1145754ca4a10dc32495ef3af9367b6e6cc.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Targets
-
-
Target
9e2d86d04cb20e3d5b557cd71115e1145754ca4a10dc32495ef3af9367b6e6cc
-
Size
1.0MB
-
MD5
91746bf540e026d2bc99ebdcb13fdf87
-
SHA1
faf64c60ba9cfcd3d8371d0032c6321c530f1574
-
SHA256
9e2d86d04cb20e3d5b557cd71115e1145754ca4a10dc32495ef3af9367b6e6cc
-
SHA512
7707728d4544e04c405d84aa81b78c6971fd2d5505566dc2a996669fbd465f510fa48a9eb53da6168370900facdd7a28e97baae0b279b3f0e14e634562714214
-
SSDEEP
12288:BMr0y90NBSICzLqTjfQu6adrOIko6Hr5B8lpHRh48YsqHV9XWCBfcwyxrLp6SK95:VyfSj36adrr6tgpAeq1Vy7xrW7mzuZ
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1