General
-
Target
8c3c135d8ce2c3b6d5664b9df034d00dbf4a1c1c9166d4977d18e28989755c35
-
Size
2.5MB
-
Sample
231013-27gt6sef71
-
MD5
a869ab6fc666564685dfd3f45c2be005
-
SHA1
f7f2cd443ffb360b1b4b120e44f8e04fc2c51632
-
SHA256
8c3c135d8ce2c3b6d5664b9df034d00dbf4a1c1c9166d4977d18e28989755c35
-
SHA512
434d4e72c14ddd3d23da04bb14661a216d894d4f55fc8fdb5ce03bc7ab7971362acf3b94f8f804cd935b56b99db6ed76d6171cc1e15b67d75bb24f14f20a7870
-
SSDEEP
49152:ybtzA0pHxVmkv6a3vQth+CRc/RX7vNVolq+fX/SaD9:ybtzikCc95hkfP3D
Static task
static1
Behavioral task
behavioral1
Sample
8c3c135d8ce2c3b6d5664b9df034d00dbf4a1c1c9166d4977d18e28989755c35.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8c3c135d8ce2c3b6d5664b9df034d00dbf4a1c1c9166d4977d18e28989755c35.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
8c3c135d8ce2c3b6d5664b9df034d00dbf4a1c1c9166d4977d18e28989755c35
-
Size
2.5MB
-
MD5
a869ab6fc666564685dfd3f45c2be005
-
SHA1
f7f2cd443ffb360b1b4b120e44f8e04fc2c51632
-
SHA256
8c3c135d8ce2c3b6d5664b9df034d00dbf4a1c1c9166d4977d18e28989755c35
-
SHA512
434d4e72c14ddd3d23da04bb14661a216d894d4f55fc8fdb5ce03bc7ab7971362acf3b94f8f804cd935b56b99db6ed76d6171cc1e15b67d75bb24f14f20a7870
-
SSDEEP
49152:ybtzA0pHxVmkv6a3vQth+CRc/RX7vNVolq+fX/SaD9:ybtzikCc95hkfP3D
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-