General
-
Target
NEAS.6f532b047ef3133943ba7d1c9e979710.exe
-
Size
539KB
-
Sample
231101-rhmn1sch6v
-
MD5
6f532b047ef3133943ba7d1c9e979710
-
SHA1
048b40f1d21bae58183717398b5072d3d412577a
-
SHA256
3e86bd1463b0fbcb4c39762cee11a8e301816821af2c3708110a65fbe3f16916
-
SHA512
8e360455a5304e08247ad73ab77c7503f986e0c6c175ce32d8de80eb59803747ce2dc0512d86a12634aaa33e5353b47fa1077b4d71b02d4517a753c8fe70a128
-
SSDEEP
12288:yMrWy901HTdXc+y//fUVop3PKPY152Z57fGbgNMV:Aye++y3fCop3PKQ15kZBNu
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6f532b047ef3133943ba7d1c9e979710.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
jordan
77.91.124.55:19071
Targets
-
-
Target
NEAS.6f532b047ef3133943ba7d1c9e979710.exe
-
Size
539KB
-
MD5
6f532b047ef3133943ba7d1c9e979710
-
SHA1
048b40f1d21bae58183717398b5072d3d412577a
-
SHA256
3e86bd1463b0fbcb4c39762cee11a8e301816821af2c3708110a65fbe3f16916
-
SHA512
8e360455a5304e08247ad73ab77c7503f986e0c6c175ce32d8de80eb59803747ce2dc0512d86a12634aaa33e5353b47fa1077b4d71b02d4517a753c8fe70a128
-
SSDEEP
12288:yMrWy901HTdXc+y//fUVop3PKPY152Z57fGbgNMV:Aye++y3fCop3PKQ15kZBNu
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1