General
-
Target
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7
-
Size
2.5MB
-
Sample
231014-a5gb3sgc5x
-
MD5
1f664d1699b3dcf5bb3accc6566833e4
-
SHA1
a8ee465ce7702482e2e63d3ba06306ea80f2be25
-
SHA256
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7
-
SHA512
bb970ae19fb933706e18fc71ebe8ee2c1b29033e83558ba752c3e763be7aaca89bfdf981b4c881bbf2267809faa32b068a22422fb6371233b65176b33a8366a2
-
SSDEEP
49152:VLMtyQ3eJziMp6a3vr78NlQx2F+VTZXC:VLMtLMQC8h+V
Static task
static1
Behavioral task
behavioral1
Sample
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7
-
Size
2.5MB
-
MD5
1f664d1699b3dcf5bb3accc6566833e4
-
SHA1
a8ee465ce7702482e2e63d3ba06306ea80f2be25
-
SHA256
1a6318902483aa2924177a48f84811036b841e7b4ffb0e0eb626b1d206a37ee7
-
SHA512
bb970ae19fb933706e18fc71ebe8ee2c1b29033e83558ba752c3e763be7aaca89bfdf981b4c881bbf2267809faa32b068a22422fb6371233b65176b33a8366a2
-
SSDEEP
49152:VLMtyQ3eJziMp6a3vr78NlQx2F+VTZXC:VLMtLMQC8h+V
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-