General
-
Target
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733
-
Size
943KB
-
Sample
231011-rhf68seb74
-
MD5
e31ab4c222f7e2c4b70cd9a9f34b2ed9
-
SHA1
bc01a00bcced4f40decd3ce0952fc7da2dc47c15
-
SHA256
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733
-
SHA512
b5038fa5756f9f5320d1bd9fbb629a79a42c2dc2e69d36a5d1fefab20c6779ab0599d3a29fb8d24647041c05b348ecd55ea5b87b55a4f63d19251ca74912a017
-
SSDEEP
24576:syRS1fhUx+W5y4tGccJHohthBM+D9jTQ:b+adGDythBM+Dx
Static task
static1
Behavioral task
behavioral1
Sample
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733
-
Size
943KB
-
MD5
e31ab4c222f7e2c4b70cd9a9f34b2ed9
-
SHA1
bc01a00bcced4f40decd3ce0952fc7da2dc47c15
-
SHA256
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733
-
SHA512
b5038fa5756f9f5320d1bd9fbb629a79a42c2dc2e69d36a5d1fefab20c6779ab0599d3a29fb8d24647041c05b348ecd55ea5b87b55a4f63d19251ca74912a017
-
SSDEEP
24576:syRS1fhUx+W5y4tGccJHohthBM+D9jTQ:b+adGDythBM+Dx
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-