General
-
Target
8daaf9b436e710aa5de5bb9f8dd344c137ea24b7d8ca1e4e62774af63529618e
-
Size
1.3MB
-
Sample
231011-y3ex8scg97
-
MD5
ca0191c93a902037bc3b04de455f482b
-
SHA1
3975f57942eff951b2f7d6ef93c44ffb03a13f74
-
SHA256
8daaf9b436e710aa5de5bb9f8dd344c137ea24b7d8ca1e4e62774af63529618e
-
SHA512
71bd87a391ccd72728bfd4abae171393f083641e88bff5301d5c77ec1afaa4094356d88ad537bbdfc2dc05ff58306a2130dfdc5afa5b7a40c9b8433ea3efde2c
-
SSDEEP
24576:Aylf7zHoP28csXxIX7GX0mfFxkerVVJJUzlhlyi18:HlDMWQxCHIxdVJJUzz
Static task
static1
Behavioral task
behavioral1
Sample
8daaf9b436e710aa5de5bb9f8dd344c137ea24b7d8ca1e4e62774af63529618e.exe
Resource
win7-20230831-en
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Targets
-
-
Target
8daaf9b436e710aa5de5bb9f8dd344c137ea24b7d8ca1e4e62774af63529618e
-
Size
1.3MB
-
MD5
ca0191c93a902037bc3b04de455f482b
-
SHA1
3975f57942eff951b2f7d6ef93c44ffb03a13f74
-
SHA256
8daaf9b436e710aa5de5bb9f8dd344c137ea24b7d8ca1e4e62774af63529618e
-
SHA512
71bd87a391ccd72728bfd4abae171393f083641e88bff5301d5c77ec1afaa4094356d88ad537bbdfc2dc05ff58306a2130dfdc5afa5b7a40c9b8433ea3efde2c
-
SSDEEP
24576:Aylf7zHoP28csXxIX7GX0mfFxkerVVJJUzlhlyi18:HlDMWQxCHIxdVJJUzz
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1