General
-
Target
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441
-
Size
907KB
-
Sample
231011-l18rbaff6s
-
MD5
e2464498f3d62fa7a7002f6fc456c38c
-
SHA1
45b5a8b89ef5c1bf8d074568c29e57bcb35c0146
-
SHA256
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441
-
SHA512
c76303f07e15697751b7db599e0540648b7673512c96bc61cb9399b3d70aa3b7113ec1aadf1958a53c085510a5818ae9a9eb2602279851a6b91e1144c230e040
-
SSDEEP
12288:WMrUy90z5BbPjuqJunQTTb7y6NvviO7fKnToEzUIyJ0j5tyI3R6JaHfSqrqLYgY:qyiBbPTunQHnygx7fKnT3wIB/SqeL/Y
Static task
static1
Behavioral task
behavioral1
Sample
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Targets
-
-
Target
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441
-
Size
907KB
-
MD5
e2464498f3d62fa7a7002f6fc456c38c
-
SHA1
45b5a8b89ef5c1bf8d074568c29e57bcb35c0146
-
SHA256
c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441
-
SHA512
c76303f07e15697751b7db599e0540648b7673512c96bc61cb9399b3d70aa3b7113ec1aadf1958a53c085510a5818ae9a9eb2602279851a6b91e1144c230e040
-
SSDEEP
12288:WMrUy90z5BbPjuqJunQTTb7y6NvviO7fKnToEzUIyJ0j5tyI3R6JaHfSqrqLYgY:qyiBbPTunQHnygx7fKnT3wIB/SqeL/Y
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-