General
-
Target
4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.zip
-
Size
1.4MB
-
Sample
240402-l7gleaec51
-
MD5
5d8a732d2fa559b324b35d8397c0dbca
-
SHA1
8d7b9c8f7f220c731c1a1e4d88348c8d30a26857
-
SHA256
df41e39db9e086e94dc17e845fb14230e7985e839de0c19039a085fefa0e0e86
-
SHA512
1d9f69801af941fad8d11018ab208b69f4276da8fa59a0fb1c44eba02e9962824ac830207c93afaff0571e1cd9530d6408d2f31c04004a151ea62349adbdee3d
-
SSDEEP
24576:bl8r3VR11IgMfomWpcyqWY+7kpzD2BIWjbGq2aW/NgNL3jtCBN0sZkYTVgGC2Y6S:bW3VzKWOMj4pP6/GqM/NQL3G0kSDNy0D
Static task
static1
Behavioral task
behavioral1
Sample
4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
mystic
http://5.42.92.211/
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Targets
-
-
Target
4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe
-
Size
1.4MB
-
MD5
fb5052956af295a212cf88f91cc44135
-
SHA1
577c83e4d4902af1bff1b9a63868da8e1e13233c
-
SHA256
4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae
-
SHA512
488f0b539c2eae9e9fdc306449b9e2be2a6926cdcc156279b703168684f602c549dd6bab3fdcf8d69c706c4cc059537a32bf0311e5ddaa0e1a5f952ef89c7a3f
-
SSDEEP
24576:wyEm0mdTAf+ZFjsO7B4oiQTKsyfovwGfCbnVLJg5pXB/xWyjPiQOxTrpIviBLziI:3E+dTVF4YBnrKxewOCRSyyeJ9dZvdD9E
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1