General
-
Target
272b947a13f40100ce8c0f921ef8052344437194ee9fbaedf522c96bfef37f7a
-
Size
1.3MB
-
Sample
231011-xwa52afh9w
-
MD5
2d34713a865547f5a32bd524b861ea5d
-
SHA1
263c21a357be482563e9e6d98b8b53794e419dc4
-
SHA256
272b947a13f40100ce8c0f921ef8052344437194ee9fbaedf522c96bfef37f7a
-
SHA512
20255e5730cd1b0797f3660368d06756fdb3efb09595eca36713e0e0c3ebb6691ba149a9282990e6cc7b0d9b180cdc201b496b2501ae3665032e5a8f462e08b0
-
SSDEEP
24576:ayu5aPpq8NBAOHOXPtOcma7fhd8U0Dv8CmIVE8ct4ymYU1:hPPU83HYwa73uDkwV1ctKY
Static task
static1
Behavioral task
behavioral1
Sample
272b947a13f40100ce8c0f921ef8052344437194ee9fbaedf522c96bfef37f7a.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
272b947a13f40100ce8c0f921ef8052344437194ee9fbaedf522c96bfef37f7a
-
Size
1.3MB
-
MD5
2d34713a865547f5a32bd524b861ea5d
-
SHA1
263c21a357be482563e9e6d98b8b53794e419dc4
-
SHA256
272b947a13f40100ce8c0f921ef8052344437194ee9fbaedf522c96bfef37f7a
-
SHA512
20255e5730cd1b0797f3660368d06756fdb3efb09595eca36713e0e0c3ebb6691ba149a9282990e6cc7b0d9b180cdc201b496b2501ae3665032e5a8f462e08b0
-
SSDEEP
24576:ayu5aPpq8NBAOHOXPtOcma7fhd8U0Dv8CmIVE8ct4ymYU1:hPPU83HYwa73uDkwV1ctKY
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1