General
-
Target
2ecb39f7924c73626b533601015860660e7908da9f2cbd40a61292c83bfa515b
-
Size
1.2MB
-
Sample
231011-swbpcafg2w
-
MD5
bb18481b5ab274209279b66177f4ac87
-
SHA1
81e37a7b6a73fb9156f8bf6af69f5db49d433d5d
-
SHA256
2ecb39f7924c73626b533601015860660e7908da9f2cbd40a61292c83bfa515b
-
SHA512
f5f13ae379fa2e83eae4fdb6cf346c576f12883a4aff9790c1971579245cd9ffce7ac374f82cb6a999729800b7cdebabe951b9c1a34bcd1f6fbeed4f4d0ed370
-
SSDEEP
24576:IyEFn8VoBPJCgEhfql6eq/hq7M7Y2s+ZgoAHLasXhcaE:PEFlV8Pf5b/hq47YEZgvHLaYh
Static task
static1
Behavioral task
behavioral1
Sample
2ecb39f7924c73626b533601015860660e7908da9f2cbd40a61292c83bfa515b.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
2ecb39f7924c73626b533601015860660e7908da9f2cbd40a61292c83bfa515b
-
Size
1.2MB
-
MD5
bb18481b5ab274209279b66177f4ac87
-
SHA1
81e37a7b6a73fb9156f8bf6af69f5db49d433d5d
-
SHA256
2ecb39f7924c73626b533601015860660e7908da9f2cbd40a61292c83bfa515b
-
SHA512
f5f13ae379fa2e83eae4fdb6cf346c576f12883a4aff9790c1971579245cd9ffce7ac374f82cb6a999729800b7cdebabe951b9c1a34bcd1f6fbeed4f4d0ed370
-
SSDEEP
24576:IyEFn8VoBPJCgEhfql6eq/hq7M7Y2s+ZgoAHLasXhcaE:PEFlV8Pf5b/hq47YEZgvHLaYh
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1