General
-
Target
65affc8699d9413e3016717cf224871127d4e8b346d42ae888abe5f0469e414e
-
Size
943KB
-
Sample
231011-qqccksbg55
-
MD5
6adc6ada2339ac051903999bc36faf3b
-
SHA1
d03e60cb7c43b8af22028b9acb3bf6ef9c69d3c1
-
SHA256
65affc8699d9413e3016717cf224871127d4e8b346d42ae888abe5f0469e414e
-
SHA512
c73faa5d52818fd0ffab0ff273b96e3745f22e3b90321ef099617b895b1187245f16d7bb820ea415b1fbe62d4dc34b2c3ffa7786bf7d69abcf8933c4b3d00187
-
SSDEEP
12288:ZMrMy90mejTjWI3jJlZ6Ra6wKX+6FTiVvGe3TBErdyqDXOF5rpFSwxKqzAh2Jpvb:dyWjNMRa6wJUm5BdSyRrpFflNsItt
Static task
static1
Behavioral task
behavioral1
Sample
65affc8699d9413e3016717cf224871127d4e8b346d42ae888abe5f0469e414e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
65affc8699d9413e3016717cf224871127d4e8b346d42ae888abe5f0469e414e.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
65affc8699d9413e3016717cf224871127d4e8b346d42ae888abe5f0469e414e
-
Size
943KB
-
MD5
6adc6ada2339ac051903999bc36faf3b
-
SHA1
d03e60cb7c43b8af22028b9acb3bf6ef9c69d3c1
-
SHA256
65affc8699d9413e3016717cf224871127d4e8b346d42ae888abe5f0469e414e
-
SHA512
c73faa5d52818fd0ffab0ff273b96e3745f22e3b90321ef099617b895b1187245f16d7bb820ea415b1fbe62d4dc34b2c3ffa7786bf7d69abcf8933c4b3d00187
-
SSDEEP
12288:ZMrMy90mejTjWI3jJlZ6Ra6wKX+6FTiVvGe3TBErdyqDXOF5rpFSwxKqzAh2Jpvb:dyWjNMRa6wJUm5BdSyRrpFflNsItt
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-