General
-
Target
0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa
-
Size
886KB
-
Sample
231011-rkwppsed22
-
MD5
46c82b402d87712c62c33c2e8baf1689
-
SHA1
07827a4670dc3ccab8854763ee057cac6c174314
-
SHA256
e3c5cddeaf85d0c3be523822cb4cc8cd4c2676b45b0eb13206d1a1b75ce6e181
-
SHA512
d57805dcf10b222ae92aec0c2485ec32fccb295d5f622a01a9b60225c5a5c95add3cbbe034c34c0ea8af36b5bcf3c8824953b8a7e7e97050edc3d730ba99f14f
-
SSDEEP
24576:62yVY2Pa/rmyY+U3mrO1IGChpt6S3Q+wch2Y1:s0/rhYV3m5GCR6Q5wchJ1
Static task
static1
Behavioral task
behavioral1
Sample
0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa
-
Size
930KB
-
MD5
b5b8275871d3e90880243c2f63773b44
-
SHA1
68cee9fcc2c3fb423e76f315e6674ad78c5aa470
-
SHA256
0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa
-
SHA512
1797f3f8cf29ef8b3d6f487b5ed8895c8e6f52f40068af26b3a64655ca7abbb2210b530e0a445fa12db73b70fb3dc881d73ff75bb12baf12fa7c7a32797af565
-
SSDEEP
24576:JyGHzE2na/rmOY642zUZO1sGiNptAS3Q+oUji:8Gi/rfYYzUhGiNAQ5oUj
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-