General
-
Target
6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3
-
Size
742KB
-
Sample
231013-1986rsdc6x
-
MD5
cc79e9124504fdbbcb2b3d95a7ab12f2
-
SHA1
b855e65a80ed3d7a70b543ef2d70482bee30e465
-
SHA256
6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3
-
SHA512
8f91ab29a7853fb2cdaa67e2cad25ed8cba90efa6629bd77da69a8702aeb910045850b3d4cb37ae9f617aa43cdaba44a0fe356c047017d887bcd38164839e243
-
SSDEEP
12288:21//yfYb5BIQZVtQ7lObpjHj4u9LjHeNdS7oLOQ6Gur5GZa/gdD363hzusZN9:miuBtZelOBHj4mDaNOQ6GY5/g8RzLB
Static task
static1
Behavioral task
behavioral1
Sample
6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3
-
Size
742KB
-
MD5
cc79e9124504fdbbcb2b3d95a7ab12f2
-
SHA1
b855e65a80ed3d7a70b543ef2d70482bee30e465
-
SHA256
6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3
-
SHA512
8f91ab29a7853fb2cdaa67e2cad25ed8cba90efa6629bd77da69a8702aeb910045850b3d4cb37ae9f617aa43cdaba44a0fe356c047017d887bcd38164839e243
-
SSDEEP
12288:21//yfYb5BIQZVtQ7lObpjHj4u9LjHeNdS7oLOQ6Gur5GZa/gdD363hzusZN9:miuBtZelOBHj4mDaNOQ6GY5/g8RzLB
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-