General
-
Target
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183
-
Size
928KB
-
Sample
231010-2yskbagg3s
-
MD5
7e9038f0075273341c946e6d0a898503
-
SHA1
6f137da0a8a75adfdafbde89dae5f18ff710fe96
-
SHA256
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183
-
SHA512
d0f60d45acc701d23bb3d48c9e18b6a4388c1f0352b1cf91f008cc36da4f9354dacaaca919c2b47a0dd8d7a0f407950af2828617caa2cbc8564a8bfe6c93625b
-
SSDEEP
12288:ZMrYy90b3brxBN4FdFynLszbHw03KFvijorCSmsXzQMSrQMsiOc6H4AbZCG6AXz:Zy+bVBN4FdFSETw058sYQMuQMGc6H5D
Static task
static1
Behavioral task
behavioral1
Sample
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183
-
Size
928KB
-
MD5
7e9038f0075273341c946e6d0a898503
-
SHA1
6f137da0a8a75adfdafbde89dae5f18ff710fe96
-
SHA256
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183
-
SHA512
d0f60d45acc701d23bb3d48c9e18b6a4388c1f0352b1cf91f008cc36da4f9354dacaaca919c2b47a0dd8d7a0f407950af2828617caa2cbc8564a8bfe6c93625b
-
SSDEEP
12288:ZMrYy90b3brxBN4FdFynLszbHw03KFvijorCSmsXzQMSrQMsiOc6H4AbZCG6AXz:Zy+bVBN4FdFSETw058sYQMuQMGc6H5D
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-