General
-
Target
72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6
-
Size
1.3MB
-
Sample
241031-wfx47azpat
-
MD5
716dee739a1ca6d3fbe97ca1453e4fd3
-
SHA1
bcd1490bf52296f5e41eba2038d97b93722b1568
-
SHA256
72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6
-
SHA512
24aeb94afa0a04bc3d7c622ea242ae71a64baba14eadc2f5be48d109d52989713cefed6625050a90dbc323b9f692a6fef342291aaaa65a1017ae5c412301ae56
-
SSDEEP
24576:FymFdtmpnRMDYvZGWafUEo6TDyTh4i5H9/BVwQCwiDG5D2UFOZ+70IqHk:gmFdtCRL9gUz6aV5H9/kQC05tdPa
Static task
static1
Behavioral task
behavioral1
Sample
72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
trush
77.91.124.82:19071
-
auth_value
c13814867cde8193679cd0cad2d774be
Targets
-
-
Target
72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6
-
Size
1.3MB
-
MD5
716dee739a1ca6d3fbe97ca1453e4fd3
-
SHA1
bcd1490bf52296f5e41eba2038d97b93722b1568
-
SHA256
72df64e43614e170b58e5962ac2ae8e892ab472ad93eb1974e687245b59804b6
-
SHA512
24aeb94afa0a04bc3d7c622ea242ae71a64baba14eadc2f5be48d109d52989713cefed6625050a90dbc323b9f692a6fef342291aaaa65a1017ae5c412301ae56
-
SSDEEP
24576:FymFdtmpnRMDYvZGWafUEo6TDyTh4i5H9/BVwQCwiDG5D2UFOZ+70IqHk:gmFdtCRL9gUz6aV5H9/kQC05tdPa
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Smokeloader family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1