General
-
Target
4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.zip
-
Size
1.2MB
-
Sample
240402-l7gw6sec6v
-
MD5
fa5fbc96026a2f79bfe48326c456e1f8
-
SHA1
c3214d7d589324072e552edbee07d9822e0979ad
-
SHA256
03dc6b4a462c0fdbeeca91c17bae2a9c367bfef5b5986113d1860736e8680432
-
SHA512
170a80400c203401b2cdb003467250de4db4f2cf75545ebff467f4d7ebf3acfb8cd1ba29db6b438a2e1b66fe6101da468fa8714491d0d82f8d12b66b6c8d4f43
-
SSDEEP
24576:UZkmeM1isiXJ0W7eDoEU4EJ0OhlFEr+AEG3iu1n979qmCTyl:UZk5MO0q/EG1ErQG5n979GTW
Static task
static1
Behavioral task
behavioral1
Sample
4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Targets
-
-
Target
4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b.exe
-
Size
1.2MB
-
MD5
77ea53409cd3cbb2b02ab8f98ca0329b
-
SHA1
36a3125d8efe9d3f0f0f1329145e9ce894f019b7
-
SHA256
4e9ba42bf509f0f21b0a1f5761950e1a3dbdd82dc290dbf5e7bef53f8dc9449b
-
SHA512
06f30ceaa0c504f4589b8b9a209a2cf35452af89733fc230e3b2d01a6c15d7a208e2e45a90cafb9bc288ec32cd29d9665196f919c5aab3f369cda97571d3637b
-
SSDEEP
24576:WyJSoyMQCEgp7EvcxDyV7gK7i+Ce3Dcc9pwodSu+rdjVxrvkx8kY7lIcjiK11tPI:lJJyMXHpgv8y9gw9CezF9qgSu+rRVx71
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1