General
-
Target
25fbc20dd4b40ed07d1691903297eb73e785a9126d433eedbc5331155279a77b
-
Size
2.5MB
-
Sample
231014-bgjmzaag83
-
MD5
d9491359a3845517e5d67bc3d36b183e
-
SHA1
3c4622f487089e5b3df6d638e1b38d7ee6d4a659
-
SHA256
25fbc20dd4b40ed07d1691903297eb73e785a9126d433eedbc5331155279a77b
-
SHA512
9fbcee3ad377de0b38fb5987b9ea6b4749f05996bca5e4e2d3be9ba05b137bd106e51cb10476b9ae119c476fa037fd2cf7848537642188613555e3aef3ac7ef6
-
SSDEEP
49152:cQFzhEmxGrFGX6a3vyiHs8ZqejYPr/If20yD1q:cQSFJHRKEPc21
Static task
static1
Behavioral task
behavioral1
Sample
25fbc20dd4b40ed07d1691903297eb73e785a9126d433eedbc5331155279a77b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
25fbc20dd4b40ed07d1691903297eb73e785a9126d433eedbc5331155279a77b.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Targets
-
-
Target
25fbc20dd4b40ed07d1691903297eb73e785a9126d433eedbc5331155279a77b
-
Size
2.5MB
-
MD5
d9491359a3845517e5d67bc3d36b183e
-
SHA1
3c4622f487089e5b3df6d638e1b38d7ee6d4a659
-
SHA256
25fbc20dd4b40ed07d1691903297eb73e785a9126d433eedbc5331155279a77b
-
SHA512
9fbcee3ad377de0b38fb5987b9ea6b4749f05996bca5e4e2d3be9ba05b137bd106e51cb10476b9ae119c476fa037fd2cf7848537642188613555e3aef3ac7ef6
-
SSDEEP
49152:cQFzhEmxGrFGX6a3vyiHs8ZqejYPr/If20yD1q:cQSFJHRKEPc21
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-