General
-
Target
4ba2694fd56d0743b005f0bb911563c4b70f06aaf2ad9e97d38293fc2574f02c
-
Size
2.5MB
-
Sample
231014-bafyhagf2z
-
MD5
f4dc163b9b455dc7170c0818f3e531e2
-
SHA1
7e6010d3b08776c7cfb73230bab80cf751ad0328
-
SHA256
4ba2694fd56d0743b005f0bb911563c4b70f06aaf2ad9e97d38293fc2574f02c
-
SHA512
397de2905f08ee3ad1e4927e659e6bc7607cb007212060cfd0588612eafc3f501c09e9dfc76223c4e028b5b8cfecc1013fb4f156dfd09cbf71fa262230e4b6e2
-
SSDEEP
49152:BDRodsK5RBgEs6a3vWyjstJZhAtkLbnV7Rx:BDRocEL8srZEkXV7R
Static task
static1
Behavioral task
behavioral1
Sample
4ba2694fd56d0743b005f0bb911563c4b70f06aaf2ad9e97d38293fc2574f02c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4ba2694fd56d0743b005f0bb911563c4b70f06aaf2ad9e97d38293fc2574f02c.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
4ba2694fd56d0743b005f0bb911563c4b70f06aaf2ad9e97d38293fc2574f02c
-
Size
2.5MB
-
MD5
f4dc163b9b455dc7170c0818f3e531e2
-
SHA1
7e6010d3b08776c7cfb73230bab80cf751ad0328
-
SHA256
4ba2694fd56d0743b005f0bb911563c4b70f06aaf2ad9e97d38293fc2574f02c
-
SHA512
397de2905f08ee3ad1e4927e659e6bc7607cb007212060cfd0588612eafc3f501c09e9dfc76223c4e028b5b8cfecc1013fb4f156dfd09cbf71fa262230e4b6e2
-
SSDEEP
49152:BDRodsK5RBgEs6a3vWyjstJZhAtkLbnV7Rx:BDRocEL8srZEkXV7R
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-