General
-
Target
33207cfe318896bc927cdf49e4b0b36076822cfa442141851a6d6dd954df4c72
-
Size
935KB
-
Sample
231011-yts4haac2v
-
MD5
18e32fb69de34377dce250acf0e71d5f
-
SHA1
d898f6ad74430b41ac1db7fc3224a8a9e0feb95c
-
SHA256
33207cfe318896bc927cdf49e4b0b36076822cfa442141851a6d6dd954df4c72
-
SHA512
09ae37150f62c4e1f6ef5d98b2c2c39ea916e240b69fcec58a0623c25739a207fd60a906e7dac7b16d52b98ea0bf74f122971842c3dc53c169b9c62e56cce206
-
SSDEEP
24576:uyccABvTIBm26/ZJKqLbccnWVXygULL2E+:9TqvTd2yZJdbccyi5n
Static task
static1
Behavioral task
behavioral1
Sample
33207cfe318896bc927cdf49e4b0b36076822cfa442141851a6d6dd954df4c72.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
33207cfe318896bc927cdf49e4b0b36076822cfa442141851a6d6dd954df4c72.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Targets
-
-
Target
33207cfe318896bc927cdf49e4b0b36076822cfa442141851a6d6dd954df4c72
-
Size
935KB
-
MD5
18e32fb69de34377dce250acf0e71d5f
-
SHA1
d898f6ad74430b41ac1db7fc3224a8a9e0feb95c
-
SHA256
33207cfe318896bc927cdf49e4b0b36076822cfa442141851a6d6dd954df4c72
-
SHA512
09ae37150f62c4e1f6ef5d98b2c2c39ea916e240b69fcec58a0623c25739a207fd60a906e7dac7b16d52b98ea0bf74f122971842c3dc53c169b9c62e56cce206
-
SSDEEP
24576:uyccABvTIBm26/ZJKqLbccnWVXygULL2E+:9TqvTd2yZJdbccyi5n
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-