General
-
Target
221b3cf7302b2b50fc23e7095bf3a5c5a8efe47f2134bcb720d4cbdb4e920069
-
Size
1.1MB
-
Sample
231011-p2d5wagf9w
-
MD5
7b03639037d69659e6cdd8bf3a40f777
-
SHA1
2e27aa14208ac880049d440a90dd3e5bcdc13f89
-
SHA256
221b3cf7302b2b50fc23e7095bf3a5c5a8efe47f2134bcb720d4cbdb4e920069
-
SHA512
855182a0baa23e9f6e08b08fb2d73a5b18bf70b1bbe4407cbcf36c9a45bdb301c6851d2c1f61b9fa43690a4edb9335f49acfd98f2d094b30308205abeca006d5
-
SSDEEP
24576:UyjOL4dX5G+NAXiD+b6EJkdUYOf3hz/oImsuATPu:jaL4dXN+A+1Jkd/gxmszTP
Static task
static1
Behavioral task
behavioral1
Sample
221b3cf7302b2b50fc23e7095bf3a5c5a8efe47f2134bcb720d4cbdb4e920069.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
221b3cf7302b2b50fc23e7095bf3a5c5a8efe47f2134bcb720d4cbdb4e920069.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
pusan
77.91.124.82:19071
-
auth_value
49f1ff7912f5add2bc6a2e5f2949e35b
Targets
-
-
Target
221b3cf7302b2b50fc23e7095bf3a5c5a8efe47f2134bcb720d4cbdb4e920069
-
Size
1.1MB
-
MD5
7b03639037d69659e6cdd8bf3a40f777
-
SHA1
2e27aa14208ac880049d440a90dd3e5bcdc13f89
-
SHA256
221b3cf7302b2b50fc23e7095bf3a5c5a8efe47f2134bcb720d4cbdb4e920069
-
SHA512
855182a0baa23e9f6e08b08fb2d73a5b18bf70b1bbe4407cbcf36c9a45bdb301c6851d2c1f61b9fa43690a4edb9335f49acfd98f2d094b30308205abeca006d5
-
SSDEEP
24576:UyjOL4dX5G+NAXiD+b6EJkdUYOf3hz/oImsuATPu:jaL4dXN+A+1Jkd/gxmszTP
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1