General
-
Target
04140a07f858242aea2e5060fd52668d03619185d20f6c8b2c6debfe4a5f7b6f.zip
-
Size
888KB
-
Sample
240402-l7ertaeg29
-
MD5
2353eb8715c39c62d03bfc1ae4e09738
-
SHA1
c69de1df9540f64a7e88263bb70b0e7ab0f25bdb
-
SHA256
270f93d55dc5666aae0c62c0ed23b6ce1f747ef57863d0adf577e20b2b180b48
-
SHA512
06c8fe4f3e195060dfeff9d42d9f14ec7ea4167b3868e633652187369b613224ef1acb7b8376c072a4fc0aa096349440aad6fac0a3aa3317abbe71949d6cb1ad
-
SSDEEP
24576:TupaQLQfIS62lW9TVU6fFAz5XxHvEdhuD+PWA:TwNHx2lW/UX5Xx8dUD+PB
Static task
static1
Behavioral task
behavioral1
Sample
04140a07f858242aea2e5060fd52668d03619185d20f6c8b2c6debfe4a5f7b6f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
breha
77.91.124.55:19071
Targets
-
-
Target
04140a07f858242aea2e5060fd52668d03619185d20f6c8b2c6debfe4a5f7b6f.exe
-
Size
931KB
-
MD5
d534bccd65f4d7cb7e7a00809fec8732
-
SHA1
bd88bd428b8f9f5fb6ecb7e76b8323b94faa745d
-
SHA256
04140a07f858242aea2e5060fd52668d03619185d20f6c8b2c6debfe4a5f7b6f
-
SHA512
317581f76534d28b40095f49beb6a8fa42734da6cf939ecfd4363f24d94da782a08bcd64869adae11dec46003a5c3b46e23dc1c1c6708e621f250f13aa7c7e52
-
SSDEEP
24576:ryvJJkCTQHmXNqP2T1YrBicnyBaG6+IyM1fAIv7Eo:eYmdqP2irBicX+IL1ftv
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1