General
-
Target
708a133d091b246464e1ac8ab201a14fb9ce4e4cb4aa9ed7551fbfcb1baf16a3
-
Size
846KB
-
Sample
231010-z8eebsdg34
-
MD5
8669a71c1a9ab8195442a8690ebae18b
-
SHA1
a4d95bc7972fe7124834748843fb95b904b8297e
-
SHA256
708a133d091b246464e1ac8ab201a14fb9ce4e4cb4aa9ed7551fbfcb1baf16a3
-
SHA512
4fc7a5e4e2cde830f81d155309bec9e8c67580aaf0fcd3bacc31df1db6f95f4fea18439dad399e152a2fc3a02ac277301cc5c98f3cd5647c20251c1974a9c656
-
SSDEEP
12288:fMrny90WqdGteM+roKdsU/MJXC16a0CKmtvUmVmAI57GXETc53X/nVHmbE:Qy5MG0t8AsUca/KODmAQ7iEu/nIw
Static task
static1
Behavioral task
behavioral1
Sample
708a133d091b246464e1ac8ab201a14fb9ce4e4cb4aa9ed7551fbfcb1baf16a3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
708a133d091b246464e1ac8ab201a14fb9ce4e4cb4aa9ed7551fbfcb1baf16a3.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
708a133d091b246464e1ac8ab201a14fb9ce4e4cb4aa9ed7551fbfcb1baf16a3
-
Size
846KB
-
MD5
8669a71c1a9ab8195442a8690ebae18b
-
SHA1
a4d95bc7972fe7124834748843fb95b904b8297e
-
SHA256
708a133d091b246464e1ac8ab201a14fb9ce4e4cb4aa9ed7551fbfcb1baf16a3
-
SHA512
4fc7a5e4e2cde830f81d155309bec9e8c67580aaf0fcd3bacc31df1db6f95f4fea18439dad399e152a2fc3a02ac277301cc5c98f3cd5647c20251c1974a9c656
-
SSDEEP
12288:fMrny90WqdGteM+roKdsU/MJXC16a0CKmtvUmVmAI57GXETc53X/nVHmbE:Qy5MG0t8AsUca/KODmAQ7iEu/nIw
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-