General
-
Target
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b
-
Size
924KB
-
Sample
231011-x91b3sha7y
-
MD5
5517f73ecd24fa9d53627b8ce7c4cecc
-
SHA1
13ed6802d17741dfc57478402b8c3196b8b7aedc
-
SHA256
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b
-
SHA512
81115f58bd93fa545162c14cc6a8ed13928dfed5a1a54fc30818dadc105e58a1fe8de68d29dcfdc1bb29d523e03732010b3d9a717abd570210a5f0a7d230a5ed
-
SSDEEP
24576:AyGSlOJbe3w7XrzNM1Q+K1NaU4K9o2Pc65GoksrZonbf:HIJbwwrrzNS8t44Pc65Go6b
Static task
static1
Behavioral task
behavioral1
Sample
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b
-
Size
924KB
-
MD5
5517f73ecd24fa9d53627b8ce7c4cecc
-
SHA1
13ed6802d17741dfc57478402b8c3196b8b7aedc
-
SHA256
1e5309add481a6658511e0165999534278c5e119856e1a111d631ca7d8d6f05b
-
SHA512
81115f58bd93fa545162c14cc6a8ed13928dfed5a1a54fc30818dadc105e58a1fe8de68d29dcfdc1bb29d523e03732010b3d9a717abd570210a5f0a7d230a5ed
-
SSDEEP
24576:AyGSlOJbe3w7XrzNM1Q+K1NaU4K9o2Pc65GoksrZonbf:HIJbwwrrzNS8t44Pc65Go6b
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-