General
-
Target
3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922
-
Size
1.1MB
-
Sample
231011-k365tsfa88
-
MD5
67ab1194db48b22b48894a6439bcfa30
-
SHA1
32097b8066781092d766e7a8aaabf1d9d5c90867
-
SHA256
3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922
-
SHA512
7e4944276c16cbce6064b78dd8d70e37e48ed0c5d990c36cf22bdc0741fd18eb657d8fc3cda89bdd4101044f1b6134e2ecfaf4f5c0520c696fdfc0493cabe443
-
SSDEEP
24576:ByIqMK7EuWVB8jlVUB4BHvYNPaTcTR1M832dYP5M8zykkJKp6Iqd:0Nd7EuW+lVpBHvYNieR1MG2dYM8uPJg
Static task
static1
Behavioral task
behavioral1
Sample
3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Targets
-
-
Target
3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922
-
Size
1.1MB
-
MD5
67ab1194db48b22b48894a6439bcfa30
-
SHA1
32097b8066781092d766e7a8aaabf1d9d5c90867
-
SHA256
3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922
-
SHA512
7e4944276c16cbce6064b78dd8d70e37e48ed0c5d990c36cf22bdc0741fd18eb657d8fc3cda89bdd4101044f1b6134e2ecfaf4f5c0520c696fdfc0493cabe443
-
SSDEEP
24576:ByIqMK7EuWVB8jlVUB4BHvYNPaTcTR1M832dYP5M8zykkJKp6Iqd:0Nd7EuW+lVpBHvYNieR1MG2dYM8uPJg
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-