General
-
Target
58cbfac75f4ff5655ee7a3c8f5405ec13b476621cdaddff1049fa26fec3f432c
-
Size
1.3MB
-
Sample
231011-rks9ksce5x
-
MD5
d0f4bc5aa59b95116ab5b8d409f8e699
-
SHA1
e9e43b87c86698dedfbd6af596734cf5627f99d1
-
SHA256
58cbfac75f4ff5655ee7a3c8f5405ec13b476621cdaddff1049fa26fec3f432c
-
SHA512
53294b6ffd57c060b5bf59bdfa7872d037d5eac0cddc4cededf0eda08f392c9a2ad1928173fca74b12d0add4c7f7e445f8618625f6c0f95b5e1aed4fa1853d4f
-
SSDEEP
24576:ByHKN+ex5LKS2nthiKU+R6x8IQIIe4tIOKSsEeUPEGzQwabq0O:0HKNNLKHthiKUW6x8/ISIVflozlx0
Static task
static1
Behavioral task
behavioral1
Sample
58cbfac75f4ff5655ee7a3c8f5405ec13b476621cdaddff1049fa26fec3f432c.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
58cbfac75f4ff5655ee7a3c8f5405ec13b476621cdaddff1049fa26fec3f432c
-
Size
1.3MB
-
MD5
d0f4bc5aa59b95116ab5b8d409f8e699
-
SHA1
e9e43b87c86698dedfbd6af596734cf5627f99d1
-
SHA256
58cbfac75f4ff5655ee7a3c8f5405ec13b476621cdaddff1049fa26fec3f432c
-
SHA512
53294b6ffd57c060b5bf59bdfa7872d037d5eac0cddc4cededf0eda08f392c9a2ad1928173fca74b12d0add4c7f7e445f8618625f6c0f95b5e1aed4fa1853d4f
-
SSDEEP
24576:ByHKN+ex5LKS2nthiKU+R6x8IQIIe4tIOKSsEeUPEGzQwabq0O:0HKNNLKHthiKUW6x8/ISIVflozlx0
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1