General
-
Target
86e51ae159678e7f44444ac6632fdb3a5ae3cab29904340fa30f27a7a061f542
-
Size
1.0MB
-
Sample
231011-rlatmaed57
-
MD5
6dc6ad612a18185df0879bc36d02f7a1
-
SHA1
fd01b3b7edaa0909e65e4d05473cedbea22f144b
-
SHA256
d8dbcf9d97d73d9c188044ea97b32873b6c6f82d6feed8196ff96ad7fc40a216
-
SHA512
dda862ef09ebdd78deea564ac90ca6826338d3539ee64dd1f054491c1dec64fc13ffdee08084b22fbf3b10f59c480e3ce9d47ce37f92a540cbcb7409ac97c684
-
SSDEEP
24576:PlDzqyacAMAk/0t2Qq9ToXDOpYE0h7w8kQ5WMioY8Kz/Xr7qPiKKee:PlPxaqStQ9ADOpUNtRQMio9Kzf/qPiKu
Static task
static1
Behavioral task
behavioral1
Sample
86e51ae159678e7f44444ac6632fdb3a5ae3cab29904340fa30f27a7a061f542.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Targets
-
-
Target
86e51ae159678e7f44444ac6632fdb3a5ae3cab29904340fa30f27a7a061f542
-
Size
1.1MB
-
MD5
81e4f3c1d777b459d032c70025768e67
-
SHA1
95204e1f301320603cbbec22caf56065044b9317
-
SHA256
86e51ae159678e7f44444ac6632fdb3a5ae3cab29904340fa30f27a7a061f542
-
SHA512
18d62da05813f8b96ef7fa7394f58f98cedddf410db372fef23c9ee2ca7577f02101ae33ff6917f50e182dcbc8bc9ac6e9ebcc5adcc337029aac81976fdf2d86
-
SSDEEP
24576:JypikditgQk9LGXZOpCE0nHc8kM9WMiWi8W7/PrK/MPiKGhPnW:8pktU9GZOp6HZvkMiWDW7nG/MPiKGhn
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1