General
-
Target
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1
-
Size
1.1MB
-
Sample
231011-h5rrtabd92
-
MD5
7f391f9bd79aad9469fe2e03f8f7b81d
-
SHA1
d2d873edebc27b2a0ffc36a3fc24dd2996885694
-
SHA256
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1
-
SHA512
0af548fa45286a0ba2515167eccafd3f572696dda77967235a5779c6c307d33b863d16c42ed24b6acc0a0210491c39c7babae15dd5829fa629022c22a060745b
-
SSDEEP
24576:wy4kBPcrb04MJ3hCNmrHU5NIctnBb8lZ2rJEVWZpO13VZkJ:34nf04GRzrAImkZWZpMlZ
Static task
static1
Behavioral task
behavioral1
Sample
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1
-
Size
1.1MB
-
MD5
7f391f9bd79aad9469fe2e03f8f7b81d
-
SHA1
d2d873edebc27b2a0ffc36a3fc24dd2996885694
-
SHA256
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1
-
SHA512
0af548fa45286a0ba2515167eccafd3f572696dda77967235a5779c6c307d33b863d16c42ed24b6acc0a0210491c39c7babae15dd5829fa629022c22a060745b
-
SSDEEP
24576:wy4kBPcrb04MJ3hCNmrHU5NIctnBb8lZ2rJEVWZpO13VZkJ:34nf04GRzrAImkZWZpMlZ
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-