General
-
Target
04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66
-
Size
930KB
-
Sample
231010-18jjqahb26
-
MD5
09fbae84aa07d41fcee287feada2a51c
-
SHA1
086d771b8b9769d12332d00c40678af8472d3f4e
-
SHA256
04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66
-
SHA512
35d90401c9f02ab5d3ca1b56b333bd8154cb329bd1dd6d2e2c59cc01668b6e580e0f7ef98bc995b51cf53d04aa62ff0a68f411588af225c0fdb2c2626cf20355
-
SSDEEP
12288:3Mr8y90EfLVUZBBb4V/WMdtsfl/RwZqzKHjc2TfB0yCwuVPMP3DMDDuXIPlLXD88:zyriZBSVeDfpyeAjgTmTMDRPhwO3
Static task
static1
Behavioral task
behavioral1
Sample
04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66
-
Size
930KB
-
MD5
09fbae84aa07d41fcee287feada2a51c
-
SHA1
086d771b8b9769d12332d00c40678af8472d3f4e
-
SHA256
04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66
-
SHA512
35d90401c9f02ab5d3ca1b56b333bd8154cb329bd1dd6d2e2c59cc01668b6e580e0f7ef98bc995b51cf53d04aa62ff0a68f411588af225c0fdb2c2626cf20355
-
SSDEEP
12288:3Mr8y90EfLVUZBBb4V/WMdtsfl/RwZqzKHjc2TfB0yCwuVPMP3DMDDuXIPlLXD88:zyriZBSVeDfpyeAjgTmTMDRPhwO3
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-