General
-
Target
def33a91cb94ced66cbd04f2a83c4aabe7674965f00e572e31eeeeae5009d8e9
-
Size
2.5MB
-
Sample
231014-a49x1agc4v
-
MD5
0e356f9957dcbb263d76ef5c2a9b87c1
-
SHA1
65145b4c61773a6964a4022640f536d4dfe99a1f
-
SHA256
def33a91cb94ced66cbd04f2a83c4aabe7674965f00e572e31eeeeae5009d8e9
-
SHA512
981779c8cd0fbd8a047306d18e8e0b0e31b6f08061cdcc37093acf5d787b6fac759c6d1e3bd36e5a868cacaa51239c8a503cd5146af21253bbbfa16bdde4d830
-
SSDEEP
49152:1BtzA0pHxVmkv6a3vMVuQeZ3kKnvf5x18:1BtzCkCRoQERvf5
Static task
static1
Behavioral task
behavioral1
Sample
def33a91cb94ced66cbd04f2a83c4aabe7674965f00e572e31eeeeae5009d8e9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
def33a91cb94ced66cbd04f2a83c4aabe7674965f00e572e31eeeeae5009d8e9.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
def33a91cb94ced66cbd04f2a83c4aabe7674965f00e572e31eeeeae5009d8e9
-
Size
2.5MB
-
MD5
0e356f9957dcbb263d76ef5c2a9b87c1
-
SHA1
65145b4c61773a6964a4022640f536d4dfe99a1f
-
SHA256
def33a91cb94ced66cbd04f2a83c4aabe7674965f00e572e31eeeeae5009d8e9
-
SHA512
981779c8cd0fbd8a047306d18e8e0b0e31b6f08061cdcc37093acf5d787b6fac759c6d1e3bd36e5a868cacaa51239c8a503cd5146af21253bbbfa16bdde4d830
-
SSDEEP
49152:1BtzA0pHxVmkv6a3vMVuQeZ3kKnvf5x18:1BtzCkCRoQERvf5
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-