General
-
Target
f4e165022662a0844d08978d8f46b8ac05f23f0df6a3de7a1f9a88c07040bffd
-
Size
928KB
-
Sample
231011-f2yd3sbe6v
-
MD5
a54f16b41f8a25381378eb8ef8ab2e89
-
SHA1
7c3811b0989967f66f8d51746817d3cc81c7e510
-
SHA256
f4e165022662a0844d08978d8f46b8ac05f23f0df6a3de7a1f9a88c07040bffd
-
SHA512
562e2dbe5c6e6531d5192898ae697eb96328605219a175699010cbfbc2f28df38de1c1af6d1f172b635876408e396d56abdbde26ee2a10423f02777242dedd99
-
SSDEEP
24576:PyiByvm28y0TuN8kWJret8P5o9I3pjd30:apYTuNwe8Pa9Aj
Static task
static1
Behavioral task
behavioral1
Sample
f4e165022662a0844d08978d8f46b8ac05f23f0df6a3de7a1f9a88c07040bffd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f4e165022662a0844d08978d8f46b8ac05f23f0df6a3de7a1f9a88c07040bffd.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
f4e165022662a0844d08978d8f46b8ac05f23f0df6a3de7a1f9a88c07040bffd
-
Size
928KB
-
MD5
a54f16b41f8a25381378eb8ef8ab2e89
-
SHA1
7c3811b0989967f66f8d51746817d3cc81c7e510
-
SHA256
f4e165022662a0844d08978d8f46b8ac05f23f0df6a3de7a1f9a88c07040bffd
-
SHA512
562e2dbe5c6e6531d5192898ae697eb96328605219a175699010cbfbc2f28df38de1c1af6d1f172b635876408e396d56abdbde26ee2a10423f02777242dedd99
-
SSDEEP
24576:PyiByvm28y0TuN8kWJret8P5o9I3pjd30:apYTuNwe8Pa9Aj
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-