General
-
Target
ee361fa8358b6c102fd1cfd20f3eb6b3e1b7145729071be643b34863dc78c03f
-
Size
864KB
-
Sample
231011-lxk6vahc97
-
MD5
9f535c22bb69e5e27b64fe405ef3627e
-
SHA1
a4a42fd2c102db7ec50191e33b48f2d5be4cb0e8
-
SHA256
393b3211ac79a8b5a962aaf897465841706765df3126cfd5dd54c16aaa21fffe
-
SHA512
f7f980f7b6035e1c99457c620485dba5918994d720cd3df616736b6bf912441f2622f442fa7b934daeed00166b677762c3b2b15fa008ceb077a2ab00bdb57879
-
SSDEEP
12288:7Fy90CCpH+xzDtOMByKMwA42pmqkzGFhZKD83ndWBwYQ/GWsA4SC3/gGMzA4vNkQ:hyJCOzDt1zRLzGv4DuHZ4SYMzAoN3KM
Static task
static1
Behavioral task
behavioral1
Sample
ee361fa8358b6c102fd1cfd20f3eb6b3e1b7145729071be643b34863dc78c03f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ee361fa8358b6c102fd1cfd20f3eb6b3e1b7145729071be643b34863dc78c03f.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Targets
-
-
Target
ee361fa8358b6c102fd1cfd20f3eb6b3e1b7145729071be643b34863dc78c03f
-
Size
908KB
-
MD5
46af40167006031e7f96b2adb0a94383
-
SHA1
b8b525365875535fe7c415046099999b8dd93d48
-
SHA256
ee361fa8358b6c102fd1cfd20f3eb6b3e1b7145729071be643b34863dc78c03f
-
SHA512
6d1694cc2e356da4e2a471e9895d9e9b9f537143260e430dbd34f3541ea99e745fceb83e5eb0c45d0ecc332d3b492f447423e3ab2978c8de3278578a005fa1af
-
SSDEEP
12288:IMrXy90HGxpX+PYtyKMww4249MBHhDGD83vtWdwYQ8hjsg4Sg3BgAMzS4vNeRxml:/yDxZ1zYBiDegjX4SYMzSoNdl
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-