General
-
Target
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc
-
Size
907KB
-
Sample
231011-mem36age4y
-
MD5
d616908509e9883f36385ffb9d9e81c3
-
SHA1
486d67f400c41fe42c0edbadf1f7b1118fdca355
-
SHA256
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc
-
SHA512
2f93b714aaba7b054f9673193084505c5da932031eecc668806cdabde9ed3349c9ddf02ff84276a0c43007494e3473b3367dc3113efc2ffdae7504df45ee3baf
-
SSDEEP
12288:pMrty90qFZSi7NS6+OY04Lr6W7rmpJ+6nJOfpvDKJXx9mv9omv9sLVJ2LvKDs4UV:AyNZbNnqMHOxgABI2LALg4oQwaFs
Static task
static1
Behavioral task
behavioral1
Sample
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Targets
-
-
Target
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc
-
Size
907KB
-
MD5
d616908509e9883f36385ffb9d9e81c3
-
SHA1
486d67f400c41fe42c0edbadf1f7b1118fdca355
-
SHA256
54f5d693d882ecf2897fe9f2dc2a6747679b303de60a7199800c1dfb220129cc
-
SHA512
2f93b714aaba7b054f9673193084505c5da932031eecc668806cdabde9ed3349c9ddf02ff84276a0c43007494e3473b3367dc3113efc2ffdae7504df45ee3baf
-
SSDEEP
12288:pMrty90qFZSi7NS6+OY04Lr6W7rmpJ+6nJOfpvDKJXx9mv9omv9sLVJ2LvKDs4UV:AyNZbNnqMHOxgABI2LALg4oQwaFs
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-