General
-
Target
cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140
-
Size
930KB
-
Sample
231010-2rqr5sad75
-
MD5
84000f9fddee008af0d7e2658aefff85
-
SHA1
cb3ed781cb475aa5c437fb15f7a1a4558296d11f
-
SHA256
cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140
-
SHA512
99544da0697a0bc36df0c86686a175f834fa4c461fb04642de6b9e053dfc4a976c1397aec9900028da0406d2c67dd27cf1d7b679b06697b920d87e3b3513fd24
-
SSDEEP
12288:DMr5y908AqSy9Drmu/NGFlbDn9W8cqcKc++phoVAJwRVEV/70h0CGgN4Gu+hT/ep:myhDrtwbDGgSV/7U0Stu+h7ebt3j
Static task
static1
Behavioral task
behavioral1
Sample
cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140
-
Size
930KB
-
MD5
84000f9fddee008af0d7e2658aefff85
-
SHA1
cb3ed781cb475aa5c437fb15f7a1a4558296d11f
-
SHA256
cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140
-
SHA512
99544da0697a0bc36df0c86686a175f834fa4c461fb04642de6b9e053dfc4a976c1397aec9900028da0406d2c67dd27cf1d7b679b06697b920d87e3b3513fd24
-
SSDEEP
12288:DMr5y908AqSy9Drmu/NGFlbDn9W8cqcKc++phoVAJwRVEV/70h0CGgN4Gu+hT/ep:myhDrtwbDGgSV/7U0Stu+h7ebt3j
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-