General
-
Target
1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb
-
Size
1.1MB
-
Sample
231011-k8qp2afd69
-
MD5
c4de444d7573131bc61c35cbf6dc7226
-
SHA1
b542db15bc064307b04e0f249010ad1f4ffbc91b
-
SHA256
a4149c04f886d49486445c3aa2819af34b1f0f10fa8615ed257d1a085d632f1c
-
SHA512
a33b48ddbd40de3d8e8cda3a9e7b4dd0da060a0c3f33ded7602628104ed3a8d63d4059c8d1c3af894b0813fddc2a0039dcf0dffd78e1e31d7e75942232e6db7a
-
SSDEEP
24576:7RyhjT3BrzaydvwMwxdfXeB72lzI4rlnNZDx7gj7u+oU/IL:7Et3BrGydYVpXi72lMwlnNZyj1otL
Static task
static1
Behavioral task
behavioral1
Sample
1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Targets
-
-
Target
1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb
-
Size
1.1MB
-
MD5
11dd5eeddd1c5a8eae4258a5ce11588b
-
SHA1
4d173b5e48d2a74cc63695b5f7bd1933285aea5d
-
SHA256
1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb
-
SHA512
c710bcf98a10285644d500f5b77257a4db745877ae1c79dd6ea877e8e49130ffdf21e0c947e3ac2c8742b163773d32deab6032fdf1ac47beb19f258d5d3db671
-
SSDEEP
24576:qyBkB3trTW4dv8USxrbXeB7MtzK4ZhpnjZDxDgL7u+qitIc:xBs3tra4dk1/Xi7MtGkhpnjZWL1qQI
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-