General
-
Target
aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c
-
Size
929KB
-
Sample
231010-2bn9dafd7z
-
MD5
78ca7e8b46ee79803b25186fce5d90d8
-
SHA1
11a847c3d8991603eb1c6e9ea05f3a569eba119f
-
SHA256
aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c
-
SHA512
1642dfd2b78ba46f76119f526436f2c6a24208a21128f7cd0f586cee0f1b8e2a3cf9b3e4b044776d602d299e92fef583bb8b0ce274142e0163c2be9aa5e392a6
-
SSDEEP
12288:mMrCy90rVZDGHW8433uN/JXpxEH30EZEox/j8fqFD/MX5dq6r0vcOzdXX:4ysCr433u/z6ENox//FDMX3qcOzNX
Static task
static1
Behavioral task
behavioral1
Sample
aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c
-
Size
929KB
-
MD5
78ca7e8b46ee79803b25186fce5d90d8
-
SHA1
11a847c3d8991603eb1c6e9ea05f3a569eba119f
-
SHA256
aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c
-
SHA512
1642dfd2b78ba46f76119f526436f2c6a24208a21128f7cd0f586cee0f1b8e2a3cf9b3e4b044776d602d299e92fef583bb8b0ce274142e0163c2be9aa5e392a6
-
SSDEEP
12288:mMrCy90rVZDGHW8433uN/JXpxEH30EZEox/j8fqFD/MX5dq6r0vcOzdXX:4ysCr433u/z6ENox//FDMX3qcOzNX
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-