General
-
Target
ac3d6df2d29be83092f47a7bb6c225b8.exe
-
Size
942KB
-
Sample
231011-pbgs3sgb73
-
MD5
ac3d6df2d29be83092f47a7bb6c225b8
-
SHA1
a90bd7284e56899cffc4a65c78193909da747215
-
SHA256
56aab62d74b9eb930483f2ef8a14085de117c2c603d135a3985c4eab4688d432
-
SHA512
aca372a037b4efeb7f680c2c6cbb53f58d0cc77e4236b0cc151ec114bab2dbf649aecac587c42f7da61a2030cebe67958291759f72d15dbe09a6e53a08c33e0a
-
SSDEEP
24576:FyhUhR/koGcOHbCoQpuwT7QnOot4eoozWkwf3zAUHY8OPa5:gmR/zGLHbCoKT7QnOM4eolf3ROS
Static task
static1
Behavioral task
behavioral1
Sample
ac3d6df2d29be83092f47a7bb6c225b8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ac3d6df2d29be83092f47a7bb6c225b8.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Targets
-
-
Target
ac3d6df2d29be83092f47a7bb6c225b8.exe
-
Size
942KB
-
MD5
ac3d6df2d29be83092f47a7bb6c225b8
-
SHA1
a90bd7284e56899cffc4a65c78193909da747215
-
SHA256
56aab62d74b9eb930483f2ef8a14085de117c2c603d135a3985c4eab4688d432
-
SHA512
aca372a037b4efeb7f680c2c6cbb53f58d0cc77e4236b0cc151ec114bab2dbf649aecac587c42f7da61a2030cebe67958291759f72d15dbe09a6e53a08c33e0a
-
SSDEEP
24576:FyhUhR/koGcOHbCoQpuwT7QnOot4eoozWkwf3zAUHY8OPa5:gmR/zGLHbCoKT7QnOM4eolf3ROS
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-