General
-
Target
d0bc67b10adff44a9eb9a65a1df817a6.exe
-
Size
649KB
-
Sample
231011-nwxvcseh22
-
MD5
d0bc67b10adff44a9eb9a65a1df817a6
-
SHA1
170e968614fc69d45ec348e83a14fc1378d21faa
-
SHA256
a2d63db0d35b63aeb7732bdb90597e690cc3c5c91cdd7398962a1833a879e91a
-
SHA512
8219fb4b2fab344ed7b73499de2d93fefdb4db2b611c88a269d6fed4363d584666609a1994a3bcfe6eb6324a84731df1fd1ea00a75936f0c0a9f812c62c9c823
-
SSDEEP
12288:RMr/y90QzGw0nMG4Qd+4A3AGiuG8LGm09BBFzvV:6yNabjAxcmG9BBFDV
Static task
static1
Behavioral task
behavioral1
Sample
d0bc67b10adff44a9eb9a65a1df817a6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d0bc67b10adff44a9eb9a65a1df817a6.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Targets
-
-
Target
d0bc67b10adff44a9eb9a65a1df817a6.exe
-
Size
649KB
-
MD5
d0bc67b10adff44a9eb9a65a1df817a6
-
SHA1
170e968614fc69d45ec348e83a14fc1378d21faa
-
SHA256
a2d63db0d35b63aeb7732bdb90597e690cc3c5c91cdd7398962a1833a879e91a
-
SHA512
8219fb4b2fab344ed7b73499de2d93fefdb4db2b611c88a269d6fed4363d584666609a1994a3bcfe6eb6324a84731df1fd1ea00a75936f0c0a9f812c62c9c823
-
SSDEEP
12288:RMr/y90QzGw0nMG4Qd+4A3AGiuG8LGm09BBFzvV:6yNabjAxcmG9BBFDV
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-