General
-
Target
2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.zip
-
Size
1.2MB
-
Sample
240402-l7fzwaec5z
-
MD5
7bf4550aee36b6346a9f67a4863bd56e
-
SHA1
cdcc32ac9b540acd53bd5c88504d5b751fd485f1
-
SHA256
6e8d5e60ae6429b7178e7f5b681709b7369e503cea731a00b6f9970a9fbf984b
-
SHA512
6fd79c1d4e96850059ff423f3c024b71c9f81adeead28995337c6ad557f9f2e89cddde7664be9de0f16dd5d8958629c71285a539c0d3c06da9b8361b4dbe604c
-
SSDEEP
24576:ap2D5ee9ZAo0yu2IR1DIQjORZAO+yFc++i6HQkYKC0GE5:229ee9SoMbiMORZA9yFbCQkYKCVa
Static task
static1
Behavioral task
behavioral1
Sample
2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Targets
-
-
Target
2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056.exe
-
Size
1.2MB
-
MD5
c12d133679d23b8140a252b1e7a808d2
-
SHA1
5ea0e77daa476f58fc3a568112615fc6782758d3
-
SHA256
2f831cc2089b767cfca2c178440b3080412146a7509b45c937654105d0043056
-
SHA512
e25e92df78309fb1c348a9de5bbead54bf3828a9f5466d1e5751d4188c50624ece31b4c1e00c5df2a09a742466d5dd3ec8537c7c9674e20edb7952063c11cc25
-
SSDEEP
24576:tyNwo5Daz1zj7bxni+qI6eLPc9ADDe6e0lPHuCiVyvjf+VsWydYDN3cc/:INw11Dbh9qIXQ9AHTekOs4fydYh33
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1