General
-
Target
bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb_JC.exe
-
Size
930KB
-
Sample
231010-z9xmasdh26
-
MD5
8088aba2e188d9b84ebf5a3b652dd4cb
-
SHA1
70987a6596826aef8c90cb5007f58016a97e8aef
-
SHA256
bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb
-
SHA512
62a66bc5d9114cb3fad23369039a94d4ef07b9c8a92dc0c6dcb3383dbe0cb4aa3ccea2938378ca038ba403aa9bfeda0c87b0acfe243d3ce5643e490c6d9cce58
-
SSDEEP
12288:0Mr4y90ClBFwnijyBzJLoZul+mjf/G96UB+Nde4LrMTgWLponH+vmSBDE/+jpqZx:cytBnjILxcwf46NH3nCzZj+sQrweL
Static task
static1
Behavioral task
behavioral1
Sample
bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb_JC.exe
-
Size
930KB
-
MD5
8088aba2e188d9b84ebf5a3b652dd4cb
-
SHA1
70987a6596826aef8c90cb5007f58016a97e8aef
-
SHA256
bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb
-
SHA512
62a66bc5d9114cb3fad23369039a94d4ef07b9c8a92dc0c6dcb3383dbe0cb4aa3ccea2938378ca038ba403aa9bfeda0c87b0acfe243d3ce5643e490c6d9cce58
-
SSDEEP
12288:0Mr4y90ClBFwnijyBzJLoZul+mjf/G96UB+Nde4LrMTgWLponH+vmSBDE/+jpqZx:cytBnjILxcwf46NH3nCzZj+sQrweL
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-