General
-
Target
c989589c460aa0ea1b11ab48658c98063df2918833af5454d1d5acadf0820bd9N
-
Size
604KB
-
Sample
240927-mpff3aybmr
-
MD5
24862159a034fa33b18aa17b0644db70
-
SHA1
43886e7c379d6525dac04ec4f88a9e322f04c33e
-
SHA256
c989589c460aa0ea1b11ab48658c98063df2918833af5454d1d5acadf0820bd9
-
SHA512
4ddac150292d75716c9aff7d49b192334f5757111f02a1c97bcb7329e8d2bea400d0c860e3469b0e5d19394dc93c9b2cecd15745b4a67daa7b3e55721e118fcc
-
SSDEEP
12288:2MrVy90nQRuyTq/eoXSzTRMgHlXHVZX95Ib/V8vfZ/ZNoX:TyTuyge9zeKXHVV95I7V8vfZHoX
Static task
static1
Malware Config
Extracted
redline
nanya
77.91.124.82:19071
-
auth_value
640aa5afe54f566d8795f0dc723f8b52
Targets
-
-
Target
c989589c460aa0ea1b11ab48658c98063df2918833af5454d1d5acadf0820bd9N
-
Size
604KB
-
MD5
24862159a034fa33b18aa17b0644db70
-
SHA1
43886e7c379d6525dac04ec4f88a9e322f04c33e
-
SHA256
c989589c460aa0ea1b11ab48658c98063df2918833af5454d1d5acadf0820bd9
-
SHA512
4ddac150292d75716c9aff7d49b192334f5757111f02a1c97bcb7329e8d2bea400d0c860e3469b0e5d19394dc93c9b2cecd15745b4a67daa7b3e55721e118fcc
-
SSDEEP
12288:2MrVy90nQRuyTq/eoXSzTRMgHlXHVZX95Ib/V8vfZ/ZNoX:TyTuyge9zeKXHVV95I7V8vfZHoX
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1