General
-
Target
034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934
-
Size
929KB
-
Sample
231011-gqggvsff63
-
MD5
262b9638b6245d7f8247906cbe04553c
-
SHA1
c8ce68f28e39e45a7d6890a173c1813ebb8687b7
-
SHA256
034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934
-
SHA512
6dc549615f579094375dee6632f2af61872c8870068589288b8794b3cf5c030c1ee2e0300eecd1dceb69c8639ae7ef9c309be8eec34f65460acb3d7d51822893
-
SSDEEP
24576:RyOzbJqTNy+gPifa1OUzHekU3s8xR3NXZ3:EOzbJqTNy+gq8vSp3Np
Static task
static1
Behavioral task
behavioral1
Sample
034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934
-
Size
929KB
-
MD5
262b9638b6245d7f8247906cbe04553c
-
SHA1
c8ce68f28e39e45a7d6890a173c1813ebb8687b7
-
SHA256
034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934
-
SHA512
6dc549615f579094375dee6632f2af61872c8870068589288b8794b3cf5c030c1ee2e0300eecd1dceb69c8639ae7ef9c309be8eec34f65460acb3d7d51822893
-
SSDEEP
24576:RyOzbJqTNy+gPifa1OUzHekU3s8xR3NXZ3:EOzbJqTNy+gq8vSp3Np
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-