General
-
Target
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819
-
Size
928KB
-
Sample
231011-vzhceabg6s
-
MD5
aecfb0ac8ddfa8d08bfc6fb3de8d82cf
-
SHA1
388d75f2dccb7ddd1ddac151efbb1de161cf61b6
-
SHA256
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819
-
SHA512
a6b38820deca050742ce32bdb91d4f36a686513476f4b85e098e43a23596254b7998f06e5bd8dc7c69ce546889c46634b8c659ac62c77dd0c7a116a00b3df37a
-
SSDEEP
24576:pyV2ELHT7A4JD1SW+qW3qhUxiannO9Jf:cVH3AGSWSAwGJ
Static task
static1
Behavioral task
behavioral1
Sample
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819
-
Size
928KB
-
MD5
aecfb0ac8ddfa8d08bfc6fb3de8d82cf
-
SHA1
388d75f2dccb7ddd1ddac151efbb1de161cf61b6
-
SHA256
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819
-
SHA512
a6b38820deca050742ce32bdb91d4f36a686513476f4b85e098e43a23596254b7998f06e5bd8dc7c69ce546889c46634b8c659ac62c77dd0c7a116a00b3df37a
-
SSDEEP
24576:pyV2ELHT7A4JD1SW+qW3qhUxiannO9Jf:cVH3AGSWSAwGJ
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-