General
-
Target
833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547
-
Size
929KB
-
Sample
231011-gxledsea5s
-
MD5
17cb84bcdf96d70834272120ae88fc94
-
SHA1
4b2dc2559f2fbb2e3d0c3b928f6f746ef34613ed
-
SHA256
833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547
-
SHA512
ae6afe65cd18c45105c588d69ea1879000254b77a87ff675bea3e26fc37512da466864a67ee7a54ec4480bbe9209fb562bc0e9847e773c57534cfd860279fc0b
-
SSDEEP
24576:zym/YDvZRoy8Ww1sQSqmPIY0IztB2PvIF7kNJVXrt:G6wQswJSzIY0itBOAU7
Static task
static1
Behavioral task
behavioral1
Sample
833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547
-
Size
929KB
-
MD5
17cb84bcdf96d70834272120ae88fc94
-
SHA1
4b2dc2559f2fbb2e3d0c3b928f6f746ef34613ed
-
SHA256
833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547
-
SHA512
ae6afe65cd18c45105c588d69ea1879000254b77a87ff675bea3e26fc37512da466864a67ee7a54ec4480bbe9209fb562bc0e9847e773c57534cfd860279fc0b
-
SSDEEP
24576:zym/YDvZRoy8Ww1sQSqmPIY0IztB2PvIF7kNJVXrt:G6wQswJSzIY0itBOAU7
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-