General
-
Target
42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e
-
Size
1.2MB
-
Sample
231011-rjmemsec23
-
MD5
7dbcdc1affd698e2d1bf305a5b1d5b4d
-
SHA1
a07ba1082da58913a805e1fa63585c30d170c433
-
SHA256
ed76b5497fce347e1e441ce34af8d7344bc00c2d1c35cc0da43452d2bd715ed1
-
SHA512
a1eb833e81d45895bcb003a9216b732adca0d21574e7a26b293da5e8c930430aae49fb1eb3d95eedde69fa647946e8199c592a80555b2f3acc72dff7e522f9cb
-
SSDEEP
24576:fyEP1WVyiN7bc8bwdZqrrStfIvqRMFI/3uRggyYuPK23iaeagM8jC:jiNEZqyNIv0M+QggyDPKTHfC
Static task
static1
Behavioral task
behavioral1
Sample
42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e
-
Size
1.3MB
-
MD5
3e6cc6888adf34693f8592cf1e727948
-
SHA1
bcf6446d49fd822ed6768ca1afbc3556f477c55c
-
SHA256
42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e
-
SHA512
6366c2f2d657b2816a6c64c05c714ed18ae1a45217b74832a9bbc52fbbb029a1c3e21290eee8eceae45eca28e0f0fa82c5ebf056accf3168341882087aeb2062
-
SSDEEP
24576:vyr3bebwVRqrJcHffQvyRMhwt3uRge2YAPK23iyeEgw8ja:6rTea/ovsMuSge2vPK717
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1