General
-
Target
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d
-
Size
928KB
-
Sample
231011-hcydwsfb9z
-
MD5
bacef800a1cc6524cb7a72a1bfb940e1
-
SHA1
ade0039895a1d0e6179127b9c6cc63df35bfac4c
-
SHA256
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d
-
SHA512
676d3c90763804eb44579ee144a11eb482a9030fe4e57345e4fb67ef679aeaf9a1a411e58939d998b1c20bfa00c1d49c6889c171cc6be4d022a253daf3547c41
-
SSDEEP
12288:pMrSy90j08aZHByNsyIhKiRxDk5KEwC/L2F2gAtwVmN+LT9eMVsRoDGtWYIE:byd8oBcsySK4x1zCL2Mg1mGpVsSDGYu
Static task
static1
Behavioral task
behavioral1
Sample
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Targets
-
-
Target
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d
-
Size
928KB
-
MD5
bacef800a1cc6524cb7a72a1bfb940e1
-
SHA1
ade0039895a1d0e6179127b9c6cc63df35bfac4c
-
SHA256
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d
-
SHA512
676d3c90763804eb44579ee144a11eb482a9030fe4e57345e4fb67ef679aeaf9a1a411e58939d998b1c20bfa00c1d49c6889c171cc6be4d022a253daf3547c41
-
SSDEEP
12288:pMrSy90j08aZHByNsyIhKiRxDk5KEwC/L2F2gAtwVmN+LT9eMVsRoDGtWYIE:byd8oBcsySK4x1zCL2Mg1mGpVsSDGYu
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-