General
-
Target
5cbeee77fe3f11cf2620893c3bda8c8e50761338af64fdb2e80eadfc9e139399
-
Size
930KB
-
Sample
231011-syetsafh8w
-
MD5
75c14c8b997bcdea41047668011afc12
-
SHA1
a563c94ff1311c7d3208126d4705103519303cd5
-
SHA256
5cbeee77fe3f11cf2620893c3bda8c8e50761338af64fdb2e80eadfc9e139399
-
SHA512
50cd4b1ba376e3539e6236a0d412592e7fa90ab6a8fce8ad52f6efaca5851c6e21ab5e1bdc53ce11ecd4c26205ef0c1dd429e20d3c2232b31d1383b5222a6b72
-
SSDEEP
24576:RyLhtIdfLXlRm6ykk0mIvJu9ksd5FMOyyNBh:EfIrRmkZFlsd5LyyNB
Static task
static1
Behavioral task
behavioral1
Sample
5cbeee77fe3f11cf2620893c3bda8c8e50761338af64fdb2e80eadfc9e139399.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5cbeee77fe3f11cf2620893c3bda8c8e50761338af64fdb2e80eadfc9e139399.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
5cbeee77fe3f11cf2620893c3bda8c8e50761338af64fdb2e80eadfc9e139399
-
Size
930KB
-
MD5
75c14c8b997bcdea41047668011afc12
-
SHA1
a563c94ff1311c7d3208126d4705103519303cd5
-
SHA256
5cbeee77fe3f11cf2620893c3bda8c8e50761338af64fdb2e80eadfc9e139399
-
SHA512
50cd4b1ba376e3539e6236a0d412592e7fa90ab6a8fce8ad52f6efaca5851c6e21ab5e1bdc53ce11ecd4c26205ef0c1dd429e20d3c2232b31d1383b5222a6b72
-
SSDEEP
24576:RyLhtIdfLXlRm6ykk0mIvJu9ksd5FMOyyNBh:EfIrRmkZFlsd5LyyNB
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-