General
-
Target
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9
-
Size
908KB
-
Sample
231011-mp8slshb81
-
MD5
29ee3db1a85d1a888c0059a7e4a290c2
-
SHA1
f85d0a6321d53ce58ad759813ce9efe0d04b17bf
-
SHA256
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9
-
SHA512
762455e6bcbe264db1b99908a4fbe634c4ddfcfd546ffc31d223bbc6c3abccae17d31951335c81e0d8c24808ffd1a56f3a5e894d876e72308bfdbfc98625e166
-
SSDEEP
24576:Yy7/kIqEv6hnRhwq9bIJiTirbKJAa8BhEGTaZAX4:f7/kjg59rbraWh3c
Static task
static1
Behavioral task
behavioral1
Sample
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Targets
-
-
Target
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9
-
Size
908KB
-
MD5
29ee3db1a85d1a888c0059a7e4a290c2
-
SHA1
f85d0a6321d53ce58ad759813ce9efe0d04b17bf
-
SHA256
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9
-
SHA512
762455e6bcbe264db1b99908a4fbe634c4ddfcfd546ffc31d223bbc6c3abccae17d31951335c81e0d8c24808ffd1a56f3a5e894d876e72308bfdbfc98625e166
-
SSDEEP
24576:Yy7/kIqEv6hnRhwq9bIJiTirbKJAa8BhEGTaZAX4:f7/kjg59rbraWh3c
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-