General
-
Target
NEAS.857ee6593a4a8c9ba7dd0431f1687f10.exe
-
Size
778KB
-
Sample
231026-elkydada4s
-
MD5
857ee6593a4a8c9ba7dd0431f1687f10
-
SHA1
3566f8277377af1b7fc229ea0882b176075dda17
-
SHA256
a4388ed26dcfcb14e6028261cf15a25f797befe5bd9e2208790c2c7f35597c9b
-
SHA512
d9ae011b609ee65969cf08e4df0c6ba9ba636e04511d7514c58bc33cbf18ea2dcd41d8666333efbed91d1f5812458aa4b1ff3c710d3b7739894dc7636f232c26
-
SSDEEP
12288:FMrZy90Xhf42ls2loWbKnjhLFeIgFN5etNUfNRjy6o2q7+azsgeZBnwD:Yyef42dbsV8pFNAN2y6oHHzsPZBn2
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.857ee6593a4a8c9ba7dd0431f1687f10.exe
Resource
win7-20231020-en
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Targets
-
-
Target
NEAS.857ee6593a4a8c9ba7dd0431f1687f10.exe
-
Size
778KB
-
MD5
857ee6593a4a8c9ba7dd0431f1687f10
-
SHA1
3566f8277377af1b7fc229ea0882b176075dda17
-
SHA256
a4388ed26dcfcb14e6028261cf15a25f797befe5bd9e2208790c2c7f35597c9b
-
SHA512
d9ae011b609ee65969cf08e4df0c6ba9ba636e04511d7514c58bc33cbf18ea2dcd41d8666333efbed91d1f5812458aa4b1ff3c710d3b7739894dc7636f232c26
-
SSDEEP
12288:FMrZy90Xhf42ls2loWbKnjhLFeIgFN5etNUfNRjy6o2q7+azsgeZBnwD:Yyef42dbsV8pFNAN2y6oHHzsPZBn2
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1