General
-
Target
e0e5c6ef21f6c8e21bf68d3c8225fb3dfe3792cd648810ccd7a91b5cbf8a6661
-
Size
1.2MB
-
Sample
231011-vb1tvace24
-
MD5
f3e7de978d348e9f499a4b709ed4e0e1
-
SHA1
f85e26789d69579e34cc6f8062e8bfe88c57a673
-
SHA256
e0e5c6ef21f6c8e21bf68d3c8225fb3dfe3792cd648810ccd7a91b5cbf8a6661
-
SHA512
5f77a4f2a90d8ea34e0f3be71a2fcc75604c4f1380dac18b87e101a586ae25b022e4d4f784f5ef53eb141a1b72d34673d08136973e67d7417bb36ab45d156a08
-
SSDEEP
24576:vyWK/ucYhfW5EN1/uET+SMzyhijFgGCTNsG2hT6cvfAXYyuDvMWF:6WLO5EN55aSMGUZgG21E6cvGYzDvM
Static task
static1
Behavioral task
behavioral1
Sample
e0e5c6ef21f6c8e21bf68d3c8225fb3dfe3792cd648810ccd7a91b5cbf8a6661.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
e0e5c6ef21f6c8e21bf68d3c8225fb3dfe3792cd648810ccd7a91b5cbf8a6661
-
Size
1.2MB
-
MD5
f3e7de978d348e9f499a4b709ed4e0e1
-
SHA1
f85e26789d69579e34cc6f8062e8bfe88c57a673
-
SHA256
e0e5c6ef21f6c8e21bf68d3c8225fb3dfe3792cd648810ccd7a91b5cbf8a6661
-
SHA512
5f77a4f2a90d8ea34e0f3be71a2fcc75604c4f1380dac18b87e101a586ae25b022e4d4f784f5ef53eb141a1b72d34673d08136973e67d7417bb36ab45d156a08
-
SSDEEP
24576:vyWK/ucYhfW5EN1/uET+SMzyhijFgGCTNsG2hT6cvfAXYyuDvMWF:6WLO5EN55aSMGUZgG21E6cvGYzDvM
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1