General
-
Target
a1e5b6abdfff86723f005da754eef040N.exe
-
Size
722KB
-
Sample
240820-slvpgayepd
-
MD5
a1e5b6abdfff86723f005da754eef040
-
SHA1
3e011e66fc70160342ec11cb33228965cb6463b1
-
SHA256
0305d2b6c0e5a97563a4c1099f4e6af9452bc102c37b5c9418f88da8991c5f64
-
SHA512
b3f069c1716f0480ccf3e20f14dd9fdeca629c630a5de75f91de29f5a9b7068937a8fe8dd7dae6ad78ab7029507a2b4687291b448554a9114079972cd06aeec3
-
SSDEEP
12288:6MrVy90RmQZAZq88kMXB03V+t0mU9aseTa8ADQoVO4s0e9t5VItDvHQcQawuKWBV:3yDbLMR2cRsUrore75yNvHVHBV
Static task
static1
Malware Config
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Targets
-
-
Target
a1e5b6abdfff86723f005da754eef040N.exe
-
Size
722KB
-
MD5
a1e5b6abdfff86723f005da754eef040
-
SHA1
3e011e66fc70160342ec11cb33228965cb6463b1
-
SHA256
0305d2b6c0e5a97563a4c1099f4e6af9452bc102c37b5c9418f88da8991c5f64
-
SHA512
b3f069c1716f0480ccf3e20f14dd9fdeca629c630a5de75f91de29f5a9b7068937a8fe8dd7dae6ad78ab7029507a2b4687291b448554a9114079972cd06aeec3
-
SSDEEP
12288:6MrVy90RmQZAZq88kMXB03V+t0mU9aseTa8ADQoVO4s0e9t5VItDvHQcQawuKWBV:3yDbLMR2cRsUrore75yNvHVHBV
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1