General
-
Target
103f8b6364336a2c791143bef169516302ed525f02567c5153850733f8f4661f
-
Size
1.2MB
-
Sample
231007-w1s1zaec7z
-
MD5
9948461a3f92d4ce32622c7af0bc3e86
-
SHA1
15d92d27fbe4e63ec70d698d5809b6b7f82a9f1d
-
SHA256
103f8b6364336a2c791143bef169516302ed525f02567c5153850733f8f4661f
-
SHA512
cba77fd8b83f974e300f494155a68ffbf5ec13632a0d642419e799047f3c7ca1675c7a287864def6a6c33bb7eaf21b67eaae90815a1cf250ae5076517215ecab
-
SSDEEP
24576:uy2Qzwz+04FAAiRrmKtQc5c10So1muco2NGcPt92897a:92QzeSAAE4cpSo1muTc19207
Static task
static1
Behavioral task
behavioral1
Sample
103f8b6364336a2c791143bef169516302ed525f02567c5153850733f8f4661f.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Targets
-
-
Target
103f8b6364336a2c791143bef169516302ed525f02567c5153850733f8f4661f
-
Size
1.2MB
-
MD5
9948461a3f92d4ce32622c7af0bc3e86
-
SHA1
15d92d27fbe4e63ec70d698d5809b6b7f82a9f1d
-
SHA256
103f8b6364336a2c791143bef169516302ed525f02567c5153850733f8f4661f
-
SHA512
cba77fd8b83f974e300f494155a68ffbf5ec13632a0d642419e799047f3c7ca1675c7a287864def6a6c33bb7eaf21b67eaae90815a1cf250ae5076517215ecab
-
SSDEEP
24576:uy2Qzwz+04FAAiRrmKtQc5c10So1muco2NGcPt92897a:92QzeSAAE4cpSo1muTc19207
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-