General
-
Target
b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37
-
Size
942KB
-
Sample
231011-rwce7sfb29
-
MD5
503083f2b28105f8a816cee8ac31527d
-
SHA1
1c78c5e7ac9c163c636e44562c1fb80524b4b001
-
SHA256
b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37
-
SHA512
23c4ea6f7d343b60ba109816e825c87c9856ad9d26823aeea40978ba296bd4468142058d75cccf442a30abb7b9a781a1948fbec3b4c26ad5d8643f552e922414
-
SSDEEP
12288:yMrKy90ZNuFZEgMAKrT3qdV93OOaIz+xuiGfs+b1s057ByY8uDMKjcZlXS+1UFXc:sy4oNSadV5t+efs+n1yagofX5z91Od
Static task
static1
Behavioral task
behavioral1
Sample
b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37
-
Size
942KB
-
MD5
503083f2b28105f8a816cee8ac31527d
-
SHA1
1c78c5e7ac9c163c636e44562c1fb80524b4b001
-
SHA256
b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37
-
SHA512
23c4ea6f7d343b60ba109816e825c87c9856ad9d26823aeea40978ba296bd4468142058d75cccf442a30abb7b9a781a1948fbec3b4c26ad5d8643f552e922414
-
SSDEEP
12288:yMrKy90ZNuFZEgMAKrT3qdV93OOaIz+xuiGfs+b1s057ByY8uDMKjcZlXS+1UFXc:sy4oNSadV5t+efs+n1yagofX5z91Od
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-