General
-
Target
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d
-
Size
929KB
-
Sample
231011-sa5ejaee51
-
MD5
299cd7a2e02c1750355def68009a316e
-
SHA1
1940e007e036b2491e3167792dd13adb74dd231c
-
SHA256
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d
-
SHA512
0182a16b0990007d380e7a6d02390d27c094e4801f5607053597ed8f6c8afab9aa95373e041c47b7d22d588d0528d42e62ed75922bd3f524ae72938fc7412e04
-
SSDEEP
24576:pyN6kW2AV6b/11GMCW29D6SKE/yWah3n4:cXWBO/vCWCeRJ
Static task
static1
Behavioral task
behavioral1
Sample
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d
-
Size
929KB
-
MD5
299cd7a2e02c1750355def68009a316e
-
SHA1
1940e007e036b2491e3167792dd13adb74dd231c
-
SHA256
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d
-
SHA512
0182a16b0990007d380e7a6d02390d27c094e4801f5607053597ed8f6c8afab9aa95373e041c47b7d22d588d0528d42e62ed75922bd3f524ae72938fc7412e04
-
SSDEEP
24576:pyN6kW2AV6b/11GMCW29D6SKE/yWah3n4:cXWBO/vCWCeRJ
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-