General
-
Target
0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48
-
Size
2.5MB
-
Sample
231014-a8fjysge21
-
MD5
b19aa14d1af7eec01527ffd908c46fd6
-
SHA1
8d7b2d29a1ac9d9d6c1425d064145c472f4f6f2b
-
SHA256
0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48
-
SHA512
14f875a6c9947c45128620e8486675a585f757c6ab186607039d85f49df7b9790145e1ee671374adeb5299f6b4d286cee2dea3c8f7f9cf2a27595e9c1f88a85d
-
SSDEEP
49152:JVMtyQ3eJzJMn6a3vxL1/GJGyz+8zRAOtm:JVMtMM6SLTE
Static task
static1
Behavioral task
behavioral1
Sample
0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48
-
Size
2.5MB
-
MD5
b19aa14d1af7eec01527ffd908c46fd6
-
SHA1
8d7b2d29a1ac9d9d6c1425d064145c472f4f6f2b
-
SHA256
0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48
-
SHA512
14f875a6c9947c45128620e8486675a585f757c6ab186607039d85f49df7b9790145e1ee671374adeb5299f6b4d286cee2dea3c8f7f9cf2a27595e9c1f88a85d
-
SSDEEP
49152:JVMtyQ3eJzJMn6a3vxL1/GJGyz+8zRAOtm:JVMtMM6SLTE
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-