General
-
Target
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc
-
Size
1.1MB
-
Sample
231011-h7kraabf52
-
MD5
822349336a1533f98fb3ce01d7075a6a
-
SHA1
911690599c8f7b1f7e904110d6d28a63fafeafd0
-
SHA256
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc
-
SHA512
56e9e0a24cba99f4e563c15b7546545e7238d9e20d66409ca1e011f5b0a06495d813c3ccfb29dc6cf3966ad730d420f00780789a018a088a34b9c95722565906
-
SSDEEP
24576:ryAUnMn6XTw4x69hD0cJNYuH8cMxtquD4EMrbmETcKxbE:eAYX8f99NH8cMeHrbmsxb
Static task
static1
Behavioral task
behavioral1
Sample
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc
-
Size
1.1MB
-
MD5
822349336a1533f98fb3ce01d7075a6a
-
SHA1
911690599c8f7b1f7e904110d6d28a63fafeafd0
-
SHA256
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc
-
SHA512
56e9e0a24cba99f4e563c15b7546545e7238d9e20d66409ca1e011f5b0a06495d813c3ccfb29dc6cf3966ad730d420f00780789a018a088a34b9c95722565906
-
SSDEEP
24576:ryAUnMn6XTw4x69hD0cJNYuH8cMxtquD4EMrbmETcKxbE:eAYX8f99NH8cMeHrbmsxb
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-