General
-
Target
NEAS.7261711d4f2c90a46ae8c035ce124af0.exe
-
Size
372KB
-
Sample
231028-ynlggaaa64
-
MD5
7261711d4f2c90a46ae8c035ce124af0
-
SHA1
9d2a01d52915c412e7a9c546b8f3b2380d1d5c49
-
SHA256
cb84a03f862a465993f39d0fe0295e86fd29be1087f5a4520741370dea44531a
-
SHA512
b0cd5fec35bd0ec021b7cbd9f993212883a1b45ff984f20f0cb5943f7eb4581fb3e7b27d6a83c1bc04e8b88dd8e150ee0385ef23e4895a698067ae3f939bf74d
-
SSDEEP
6144:Kly+bnr+Ep0yN90QE64WfV0ZMA16Lo2NW0wH9IQ7Cl2Q4ozApvO2SqY9F9BibS7t:zMrky90k0nio2gq2QzzSiquGamM
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7261711d4f2c90a46ae8c035ce124af0.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Targets
-
-
Target
NEAS.7261711d4f2c90a46ae8c035ce124af0.exe
-
Size
372KB
-
MD5
7261711d4f2c90a46ae8c035ce124af0
-
SHA1
9d2a01d52915c412e7a9c546b8f3b2380d1d5c49
-
SHA256
cb84a03f862a465993f39d0fe0295e86fd29be1087f5a4520741370dea44531a
-
SHA512
b0cd5fec35bd0ec021b7cbd9f993212883a1b45ff984f20f0cb5943f7eb4581fb3e7b27d6a83c1bc04e8b88dd8e150ee0385ef23e4895a698067ae3f939bf74d
-
SSDEEP
6144:Kly+bnr+Ep0yN90QE64WfV0ZMA16Lo2NW0wH9IQ7Cl2Q4ozApvO2SqY9F9BibS7t:zMrky90k0nio2gq2QzzSiquGamM
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1