General
-
Target
x4223126.exe
-
Size
509KB
-
Sample
231011-h567hahe3z
-
MD5
b993f23e7347015a9c19aeea5d39c192
-
SHA1
b15089ae8da45a4de0e548fb99e9d465fac6abe1
-
SHA256
ec899066f95a987847b84861ef619f96bec5fd822c5c866af5699987d3d23a02
-
SHA512
520f873975310d8a3fe73dac6b1d200a1ada6c7646300fff0ab26a90cd97c7c7ae2f9a7e9f403216a1d2188fac72853e81d2669413c922b8f1b5e724f5ec4669
-
SSDEEP
12288:6MrHy90KGSJPlGkDMo8QAjvGq4MsQ2XY65rKJ6x9ziZw7w:typxlG33Rjk4T68wHzFw
Static task
static1
Behavioral task
behavioral1
Sample
x4223126.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x4223126.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Targets
-
-
Target
x4223126.exe
-
Size
509KB
-
MD5
b993f23e7347015a9c19aeea5d39c192
-
SHA1
b15089ae8da45a4de0e548fb99e9d465fac6abe1
-
SHA256
ec899066f95a987847b84861ef619f96bec5fd822c5c866af5699987d3d23a02
-
SHA512
520f873975310d8a3fe73dac6b1d200a1ada6c7646300fff0ab26a90cd97c7c7ae2f9a7e9f403216a1d2188fac72853e81d2669413c922b8f1b5e724f5ec4669
-
SSDEEP
12288:6MrHy90KGSJPlGkDMo8QAjvGq4MsQ2XY65rKJ6x9ziZw7w:typxlG33Rjk4T68wHzFw
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-