General
-
Target
47bdf17047717563696d3823db297ffa2f67d984660bd0904355ef959e32611e
-
Size
1.2MB
-
Sample
231011-rmd8faee52
-
MD5
e4bbd33f428fb2da89692936cef045d7
-
SHA1
d3a9466b9ee9d8ff970196c549bef9958a2e5233
-
SHA256
dba10f699ee158a3c69c67d48fc33edbef00abd2758711095b782121e4b65c00
-
SHA512
e6c72b98a86c2412c51502757098bde772d5fcad598af82bc5bee9a63abe9ff1dc379ce3414ee3ef831e532107c8ec3ac48d157573245695eb41c61d1a400af8
-
SSDEEP
24576:vBWTyzNXcG1mgsjwQZK2OBo+Kk25PMKl6lD/JGhfsfpGvtuE52My6aL:ZWm+SmtwUK3odPjwlDxGhwetuE52MyLL
Static task
static1
Behavioral task
behavioral1
Sample
47bdf17047717563696d3823db297ffa2f67d984660bd0904355ef959e32611e.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
47bdf17047717563696d3823db297ffa2f67d984660bd0904355ef959e32611e
-
Size
1.2MB
-
MD5
267362640ba5a4ffc7de0164ae7950e2
-
SHA1
da546832e37c0db9c6b5951607b6c3c87b25dd40
-
SHA256
47bdf17047717563696d3823db297ffa2f67d984660bd0904355ef959e32611e
-
SHA512
2a58ee981ac10e632e420047bdf71dcbe19ff0e42604295bb76ce50a5700267ae0465ef0c24f209a6692399480e24baa0d6094c4bb6e59b2532f2674a0f7ebca
-
SSDEEP
24576:syk2G/KgsjoI522mBCUUK25BIrs6Bx/JgKnfG/WtkMo6axq:bjwKtoq21CDuBBxxgYptkMoL
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1