General
-
Target
x0915341.exe
-
Size
390KB
-
Sample
231011-t92claae4y
-
MD5
f5392a029dcc2a47d9fb5d9afe22d331
-
SHA1
6f7d07aaea42087afa71597e9ac041ee29a23bd0
-
SHA256
7ad545bb4737b69c23cdad695529678edf0857220df5c0cf5ffeb6976f09d06e
-
SHA512
7a510e5a2dbe10b448109405da21bc242e714ac41d56f02f10730b5c98e75f317793a5cdc7366e008ceee466e64ecd2541714cdf0cd137023acc6e6bc935e896
-
SSDEEP
12288:JMrcy90SNC9LtC9CMwrxUIAiEZZgJ3Bjzv:dyTNC9LMLwrx1Oizv
Static task
static1
Behavioral task
behavioral1
Sample
x0915341.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x0915341.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
x0915341.exe
-
Size
390KB
-
MD5
f5392a029dcc2a47d9fb5d9afe22d331
-
SHA1
6f7d07aaea42087afa71597e9ac041ee29a23bd0
-
SHA256
7ad545bb4737b69c23cdad695529678edf0857220df5c0cf5ffeb6976f09d06e
-
SHA512
7a510e5a2dbe10b448109405da21bc242e714ac41d56f02f10730b5c98e75f317793a5cdc7366e008ceee466e64ecd2541714cdf0cd137023acc6e6bc935e896
-
SSDEEP
12288:JMrcy90SNC9LtC9CMwrxUIAiEZZgJ3Bjzv:dyTNC9LMLwrx1Oizv
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-