General
-
Target
efea1c78554300df5eb3eedaffb2293fe3a7533b80e5eb5d7286443679c4fa90
-
Size
1.2MB
-
Sample
231006-zqeblsab57
-
MD5
c8ed428ce8ad84be6787d5afa45691be
-
SHA1
6778682df4879e5be9b2dd500d351c05df74c338
-
SHA256
efea1c78554300df5eb3eedaffb2293fe3a7533b80e5eb5d7286443679c4fa90
-
SHA512
a57556bf32b35504268e9be72e1192a8749401a174153cf9e2564fe7eb7d651d236407328205840ac1f412245053176fe4a6590df560186d06aadf5e443cbd82
-
SSDEEP
24576:1yji3fmDxrSEQC2RaROsaq6KOXMTZmeMMmlXpmDda762UbypYlMC8WIm:Qm3firSEQChRTaqC6pMplX4DA7sycDQ
Static task
static1
Behavioral task
behavioral1
Sample
efea1c78554300df5eb3eedaffb2293fe3a7533b80e5eb5d7286443679c4fa90.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Targets
-
-
Target
efea1c78554300df5eb3eedaffb2293fe3a7533b80e5eb5d7286443679c4fa90
-
Size
1.2MB
-
MD5
c8ed428ce8ad84be6787d5afa45691be
-
SHA1
6778682df4879e5be9b2dd500d351c05df74c338
-
SHA256
efea1c78554300df5eb3eedaffb2293fe3a7533b80e5eb5d7286443679c4fa90
-
SHA512
a57556bf32b35504268e9be72e1192a8749401a174153cf9e2564fe7eb7d651d236407328205840ac1f412245053176fe4a6590df560186d06aadf5e443cbd82
-
SSDEEP
24576:1yji3fmDxrSEQC2RaROsaq6KOXMTZmeMMmlXpmDda762UbypYlMC8WIm:Qm3firSEQChRTaqC6pMplX4DA7sycDQ
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-