General
-
Target
c324b4b4607b9b2b44ef58d73be9907a507f3f61811f8c1c65400558606b6377
-
Size
2.5MB
-
Sample
231013-3ctqxsgf38
-
MD5
bbdca2094e19141411a5bf3b01a18abc
-
SHA1
42de98f7e2720ec6a87dda5142dc0b18db75fe1a
-
SHA256
c324b4b4607b9b2b44ef58d73be9907a507f3f61811f8c1c65400558606b6377
-
SHA512
9660e32e581381aa3cb3247fae095ab3e760119b600c09bf61ec325d657d75ec09e5c57e74395775cc8df79e99819593020a51568c4db3a74442cd0b7968fd15
-
SSDEEP
49152:4GMtyQ3eJziMp6a3vw+9aWzUiJ6L1ot5NB:4GMtLMQ5+9aWzLJ6xo/N
Static task
static1
Behavioral task
behavioral1
Sample
c324b4b4607b9b2b44ef58d73be9907a507f3f61811f8c1c65400558606b6377.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c324b4b4607b9b2b44ef58d73be9907a507f3f61811f8c1c65400558606b6377.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
c324b4b4607b9b2b44ef58d73be9907a507f3f61811f8c1c65400558606b6377
-
Size
2.5MB
-
MD5
bbdca2094e19141411a5bf3b01a18abc
-
SHA1
42de98f7e2720ec6a87dda5142dc0b18db75fe1a
-
SHA256
c324b4b4607b9b2b44ef58d73be9907a507f3f61811f8c1c65400558606b6377
-
SHA512
9660e32e581381aa3cb3247fae095ab3e760119b600c09bf61ec325d657d75ec09e5c57e74395775cc8df79e99819593020a51568c4db3a74442cd0b7968fd15
-
SSDEEP
49152:4GMtyQ3eJziMp6a3vw+9aWzUiJ6L1ot5NB:4GMtLMQ5+9aWzLJ6xo/N
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-