General
-
Target
27319f213bcd97775862f7d2b1b8cf0aacd10b63f658ae3073123af375743a1b
-
Size
1.3MB
-
Sample
231011-rjm16scd6s
-
MD5
556ca29c7ae44545dfe2fe704ab21ea5
-
SHA1
343211ed26e9e22fe3e1cccbedbedba66f9d1713
-
SHA256
27319f213bcd97775862f7d2b1b8cf0aacd10b63f658ae3073123af375743a1b
-
SHA512
78400d59a7346c01cc806c957f11f89b9223a3d042cfff6716e2bf742745d216405a9dc5dafa0ebfedf47d36715952f347837531ff7ef9a774f796dc3fce5c06
-
SSDEEP
24576:syFBytZvPnZdOH5RhZd1KSlpmldRk0RTyzdbFV23tk8hlQ+Qrpzip6V:bFQtJPnORVplpoRkKy5INX+NuU
Static task
static1
Behavioral task
behavioral1
Sample
27319f213bcd97775862f7d2b1b8cf0aacd10b63f658ae3073123af375743a1b.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
27319f213bcd97775862f7d2b1b8cf0aacd10b63f658ae3073123af375743a1b
-
Size
1.3MB
-
MD5
556ca29c7ae44545dfe2fe704ab21ea5
-
SHA1
343211ed26e9e22fe3e1cccbedbedba66f9d1713
-
SHA256
27319f213bcd97775862f7d2b1b8cf0aacd10b63f658ae3073123af375743a1b
-
SHA512
78400d59a7346c01cc806c957f11f89b9223a3d042cfff6716e2bf742745d216405a9dc5dafa0ebfedf47d36715952f347837531ff7ef9a774f796dc3fce5c06
-
SSDEEP
24576:syFBytZvPnZdOH5RhZd1KSlpmldRk0RTyzdbFV23tk8hlQ+Qrpzip6V:bFQtJPnORVplpoRkKy5INX+NuU
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1