General
-
Target
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.zip
-
Size
1.8MB
-
Sample
241011-w1f2eawfrd
-
MD5
c1e9e1e9ea18bf3d3fced73b0cac0d62
-
SHA1
ce3d866c3c4388680808f6ba4a6762350f46a4c3
-
SHA256
8595e924427a373d61d1040b3d3c8068c6530a2b9ad8b4b3a4ba1e3581fb1cb1
-
SHA512
224cdf7d59de7e97f60576e451f0fe8be9c0d6abcc0495d4854dfeae228ac6edf0528cd4ac7d5fb836934e0a789feff4c2d624d38904f2e647f27af544ca67a7
-
SSDEEP
49152:FaQ6iwkIx5sZzCetwCL7s1Fu1n9PZFqUc5DLGgt0xIL:KkI4CjzAehRKm
Static task
static1
Behavioral task
behavioral1
Sample
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Targets
-
-
Target
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe
-
Size
1.8MB
-
MD5
18cbe55c3b28754916f1cbf4dfc95cf9
-
SHA1
7ccfb7678c34d6a2bedc040da04e2b5201be453b
-
SHA256
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b
-
SHA512
e1d4a7ab164a7e4176a3e4e915480e5c60efe7680d99f0f0bcbd834a4bec1798b951c49ef5c0cca6bea3c2577b475de3c51b2ef1ae70b525d046eb06591f7110
-
SSDEEP
49152:Eau0Bnly1l8B6hLa5vMIKHVo5W1v2mS0la98MT:Nfy1Wo+JK19eFE6
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1