General
-
Target
74dbc3d7bc4b0de17bdd33a872a9d07c9f2f1089c91cc4f59eb2672a256c2841
-
Size
1.2MB
-
Sample
231011-rj7qksce2v
-
MD5
4721682e8f20ab8c33d5ab872b9f80f0
-
SHA1
279af8e040748d966a145638374a68e0d008086c
-
SHA256
a9b2b74c36e9b58f487e1cfb7c08770703489e157bee317ec1acdf03843eecab
-
SHA512
d903650efc03fb94ecf9d7578533e7242665155abde780170d20d70a34fce5519d8885a6382757d326a9b13ddce096e26d3e439c816fb81a7adb8e49624cee1f
-
SSDEEP
24576:NAUyp8XTjTZm6s1I1SNRDX2q3lD3Ia/lvAu0gJT5FXpCwb0nRn8:2jc/TZm6sa18Tb3J/kqVOwb0nR8
Static task
static1
Behavioral task
behavioral1
Sample
74dbc3d7bc4b0de17bdd33a872a9d07c9f2f1089c91cc4f59eb2672a256c2841.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
74dbc3d7bc4b0de17bdd33a872a9d07c9f2f1089c91cc4f59eb2672a256c2841
-
Size
1.3MB
-
MD5
7b49994e9e463dd71b4ab8c09f9a3eb9
-
SHA1
2fcfaec0bf70816d8221175476b1b7c7d7f523c2
-
SHA256
74dbc3d7bc4b0de17bdd33a872a9d07c9f2f1089c91cc4f59eb2672a256c2841
-
SHA512
013d58ca49a50059e817a4d43fb46c8dde2d12f291b3d1e10418dc0607f1a6f7874cc926f0e43c08bc9f1cbae1dcd97b860f713d3a34a2560866ba8e10a985b7
-
SSDEEP
24576:EyfbdTZK6m7o7oNJDX0qXlp3I6/lTAEqsRT5JzpQwZ0nRnTY:TfZTZK6mM7oTFXXJyIVQwZ0nR
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1