General
-
Target
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef
-
Size
1.2MB
-
Sample
231007-tzpk2sdg2z
-
MD5
8062d3af8d126f153a6f8d5203972b4b
-
SHA1
fcaf218814d45ed77751ff21057ad3bca5c6f485
-
SHA256
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef
-
SHA512
b5ee77a25aee48c11c645996f7b7faecdf168e979b5d76afd1093ae28deaa35a01c7db398155f13da6ae757cf05c536688a081ca8e07c332fb7c646b8a8a2f33
-
SSDEEP
24576:zytYpZ9ztKtIUClvanandVVGNLCgLnKPgLbdj6u5eBrEsaDrR:GepHxVkoTVqLC0KPMdj6wcrEHr
Static task
static1
Behavioral task
behavioral1
Sample
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Targets
-
-
Target
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef
-
Size
1.2MB
-
MD5
8062d3af8d126f153a6f8d5203972b4b
-
SHA1
fcaf218814d45ed77751ff21057ad3bca5c6f485
-
SHA256
9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef
-
SHA512
b5ee77a25aee48c11c645996f7b7faecdf168e979b5d76afd1093ae28deaa35a01c7db398155f13da6ae757cf05c536688a081ca8e07c332fb7c646b8a8a2f33
-
SSDEEP
24576:zytYpZ9ztKtIUClvanandVVGNLCgLnKPgLbdj6u5eBrEsaDrR:GepHxVkoTVqLC0KPMdj6wcrEHr
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-