General
-
Target
968c5a1bf53c7a85142c69165c083901604aafb1f7a89dcf0d6fc867a640495a
-
Size
1.2MB
-
Sample
231007-xcpt3sgh56
-
MD5
4be99cfc87828f4df9354f48f3c6a188
-
SHA1
097f7e65ea23bdfbb489b2bd0df0e0d57bebd3ce
-
SHA256
968c5a1bf53c7a85142c69165c083901604aafb1f7a89dcf0d6fc867a640495a
-
SHA512
d61410956fd706bd19ded81f89fe96b58628b52a847c155a471bbf7c4839a06a80773dc5de2229ad2938f2203f1dc06835762780e5cc050aae0c85e2b674e5cf
-
SSDEEP
24576:9y46gSLX2RUPoDmYYp4Fy4KNCj4Gntb1kgzTuPu6:Y46gEXS3KGFytAjR7Wu
Static task
static1
Behavioral task
behavioral1
Sample
968c5a1bf53c7a85142c69165c083901604aafb1f7a89dcf0d6fc867a640495a.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Targets
-
-
Target
968c5a1bf53c7a85142c69165c083901604aafb1f7a89dcf0d6fc867a640495a
-
Size
1.2MB
-
MD5
4be99cfc87828f4df9354f48f3c6a188
-
SHA1
097f7e65ea23bdfbb489b2bd0df0e0d57bebd3ce
-
SHA256
968c5a1bf53c7a85142c69165c083901604aafb1f7a89dcf0d6fc867a640495a
-
SHA512
d61410956fd706bd19ded81f89fe96b58628b52a847c155a471bbf7c4839a06a80773dc5de2229ad2938f2203f1dc06835762780e5cc050aae0c85e2b674e5cf
-
SSDEEP
24576:9y46gSLX2RUPoDmYYp4Fy4KNCj4Gntb1kgzTuPu6:Y46gEXS3KGFytAjR7Wu
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-