General
-
Target
6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.zip
-
Size
988KB
-
Sample
240402-l7g7yaeg43
-
MD5
d88eab2789f3e4a7afa381ca99f21c93
-
SHA1
c3fef5f38a790d5cde01a115bce35a8b478d10ac
-
SHA256
0cc4274cd2f1ffb018b575599b9130d19ab4af75f63ce1644675e75a668a0c1f
-
SHA512
09c91ac905b9dcab89762aea4bc22376450cc50c898d398fda2bb13f0939c83773801d05aef8c93f4aee6cf8fcc82cf3eb89b2409ca8e2082f1482cbbd4d8c59
-
SSDEEP
24576:LhGIR8PKMfDCdhQyVIHsbUS6DjW0mmuc9pxVtTaqMA:NzoKWCktHsbUS69/5Ta0
Static task
static1
Behavioral task
behavioral1
Sample
6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Targets
-
-
Target
6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4.exe
-
Size
1.0MB
-
MD5
0fc9cee6808909feddf5c8e4e30c7abb
-
SHA1
e7498be8807c91714ebcd30d698e3ea0670ef6cb
-
SHA256
6d9b4a93f740f8bfcb75f34163e4a8e5eba03c0a61b187c356011f7f367246d4
-
SHA512
80eb9a7ec6826b949b76d5e24200418647e86fecf6144900e900983f50c6502fc32fc1d90b577e27dab7ed2f2e6625ec6326f690c4ab17905ac46b2469b46353
-
SSDEEP
24576:8ygbPFjq6/rtm4RLWdXuFFFymJ5throrhUniYRHA:rgbPRq6ztxS0b/vrDnBR
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1