General
-
Target
bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387
-
Size
373KB
-
Sample
241102-r3bggsxaqc
-
MD5
54d2dcca449229bc210b853b0a52bdc5
-
SHA1
07b9e5e210c362612268757ea4b640a1120ede24
-
SHA256
bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387
-
SHA512
17b401edb54f5524630e9a5957b7b4141ed6638a9f1051be3d08e7b568e40a61f520280023ea2ef2aac2233858946ad47107fcc5e010800f13e16e48fa5faa8c
-
SSDEEP
6144:KJy+bnr+1p0yN90QEvuWi9trCxH4MTtIg/kDKb1CXnlH6ThA03uS1QUrT:7MrJy90INuYO5jAl+A031D
Static task
static1
Malware Config
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Targets
-
-
Target
bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387
-
Size
373KB
-
MD5
54d2dcca449229bc210b853b0a52bdc5
-
SHA1
07b9e5e210c362612268757ea4b640a1120ede24
-
SHA256
bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387
-
SHA512
17b401edb54f5524630e9a5957b7b4141ed6638a9f1051be3d08e7b568e40a61f520280023ea2ef2aac2233858946ad47107fcc5e010800f13e16e48fa5faa8c
-
SSDEEP
6144:KJy+bnr+1p0yN90QEvuWi9trCxH4MTtIg/kDKb1CXnlH6ThA03uS1QUrT:7MrJy90INuYO5jAl+A031D
-
Detect Mystic stealer payload
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1