General
-
Target
NEAS.af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e_JC.exe
-
Size
1.2MB
-
Sample
231006-zmxc1sab28
-
MD5
e0cc4babef04cb748eaa8b45ecc4bb42
-
SHA1
6c1afcf2f818a340ddf35f7eb7a76df5b3263da7
-
SHA256
af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e
-
SHA512
8f104c7571e892c02d88466fc5d50163d114ffe8a749836cf0046cd6652e41877edf22220a87d2c7089fc4dab2c9ec84d8b5ca92589383313b391e2c2967c266
-
SSDEEP
24576:yyU1DHful+Fu+35mJcdoOEfsUIb2ho+RQEMnW9SMp/YwVhK:ZUJf+CggE0UIb2hoqGW9S4Qch
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Targets
-
-
Target
NEAS.af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e_JC.exe
-
Size
1.2MB
-
MD5
e0cc4babef04cb748eaa8b45ecc4bb42
-
SHA1
6c1afcf2f818a340ddf35f7eb7a76df5b3263da7
-
SHA256
af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e
-
SHA512
8f104c7571e892c02d88466fc5d50163d114ffe8a749836cf0046cd6652e41877edf22220a87d2c7089fc4dab2c9ec84d8b5ca92589383313b391e2c2967c266
-
SSDEEP
24576:yyU1DHful+Fu+35mJcdoOEfsUIb2ho+RQEMnW9SMp/YwVhK:ZUJf+CggE0UIb2hoqGW9S4Qch
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-