General
-
Target
3c2d424eb0ce7247e886445f3bee74414d0c3c61b5a47214d8bff84cfe31b3f7
-
Size
929KB
-
Sample
231011-sxbqqsfh2v
-
MD5
8ec79a42d4b0f2035403361b5da3e882
-
SHA1
61a7cb22e4e81d514fd6afa5dbf6ea9a7a61dfe5
-
SHA256
3c2d424eb0ce7247e886445f3bee74414d0c3c61b5a47214d8bff84cfe31b3f7
-
SHA512
e9e88fb8c4e3672b2228f6711939d3d6421caa6a24196513503300ad1a71a222ac56605eab367614b8b7352bc5a17265af441c3416b14fea5df3e98f6413dc70
-
SSDEEP
12288:HMrSy90HaYq8+S8OUSKnnfB2HTXTAXsPNbLeFBtEA4jcSl2AZHZtCymuMjCRMR8H:5ybVvSdKfBeDTnPBeFml2AdZIyRGc
Static task
static1
Behavioral task
behavioral1
Sample
3c2d424eb0ce7247e886445f3bee74414d0c3c61b5a47214d8bff84cfe31b3f7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3c2d424eb0ce7247e886445f3bee74414d0c3c61b5a47214d8bff84cfe31b3f7.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
3c2d424eb0ce7247e886445f3bee74414d0c3c61b5a47214d8bff84cfe31b3f7
-
Size
929KB
-
MD5
8ec79a42d4b0f2035403361b5da3e882
-
SHA1
61a7cb22e4e81d514fd6afa5dbf6ea9a7a61dfe5
-
SHA256
3c2d424eb0ce7247e886445f3bee74414d0c3c61b5a47214d8bff84cfe31b3f7
-
SHA512
e9e88fb8c4e3672b2228f6711939d3d6421caa6a24196513503300ad1a71a222ac56605eab367614b8b7352bc5a17265af441c3416b14fea5df3e98f6413dc70
-
SSDEEP
12288:HMrSy90HaYq8+S8OUSKnnfB2HTXTAXsPNbLeFBtEA4jcSl2AZHZtCymuMjCRMR8H:5ybVvSdKfBeDTnPBeFml2AdZIyRGc
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-