General
-
Target
3165ce83f61e0ca5e10b4636e88c82eb79dbea5028c60cda646b1d22bdede78b
-
Size
1.0MB
-
Sample
231010-zczqdsbf52
-
MD5
0cd42e6a819c6e0f4871b4a9de267a02
-
SHA1
129e3fff137fb270b1e936071e3699ad1ba94ca3
-
SHA256
3165ce83f61e0ca5e10b4636e88c82eb79dbea5028c60cda646b1d22bdede78b
-
SHA512
c972086d80895e40be30c41af73d0ba56a894b49983ce26790aa319b03d15a216c49f5a71fa9bcc1eeae90c73b64933f33e5a57e35076ace3c75e6c741bd1dde
-
SSDEEP
24576:VyD1DeCByCxL15m/1MEiEiEwE80zwLZw:wD1JByQi/eEGEplg
Static task
static1
Behavioral task
behavioral1
Sample
3165ce83f61e0ca5e10b4636e88c82eb79dbea5028c60cda646b1d22bdede78b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3165ce83f61e0ca5e10b4636e88c82eb79dbea5028c60cda646b1d22bdede78b.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
3165ce83f61e0ca5e10b4636e88c82eb79dbea5028c60cda646b1d22bdede78b
-
Size
1.0MB
-
MD5
0cd42e6a819c6e0f4871b4a9de267a02
-
SHA1
129e3fff137fb270b1e936071e3699ad1ba94ca3
-
SHA256
3165ce83f61e0ca5e10b4636e88c82eb79dbea5028c60cda646b1d22bdede78b
-
SHA512
c972086d80895e40be30c41af73d0ba56a894b49983ce26790aa319b03d15a216c49f5a71fa9bcc1eeae90c73b64933f33e5a57e35076ace3c75e6c741bd1dde
-
SSDEEP
24576:VyD1DeCByCxL15m/1MEiEiEwE80zwLZw:wD1JByQi/eEGEplg
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-