General
-
Target
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15
-
Size
742KB
-
Sample
231014-cp9d2abd61
-
MD5
2670dec8c84136ccffc4f5845cff9918
-
SHA1
ad5bfdf880baeec86339601e4213b151b74e01ba
-
SHA256
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15
-
SHA512
ab3eea0f50709c8f1eba115b574df1db5f8187c736de4d46ac7679e73e8b90d12d883658002a2a9a2dba3abc79b55a78933e36999bb6a49b9178fa4b446f8ede
-
SSDEEP
12288:Ox//yfYb5BIQZVtrdMLIMqn28nJ/w8tPz3WIBdNSj83QZZWq/3K9:KiuBtZWLI1nFJ/tF7EA3sZWqv+
Static task
static1
Behavioral task
behavioral1
Sample
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15
-
Size
742KB
-
MD5
2670dec8c84136ccffc4f5845cff9918
-
SHA1
ad5bfdf880baeec86339601e4213b151b74e01ba
-
SHA256
94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15
-
SHA512
ab3eea0f50709c8f1eba115b574df1db5f8187c736de4d46ac7679e73e8b90d12d883658002a2a9a2dba3abc79b55a78933e36999bb6a49b9178fa4b446f8ede
-
SSDEEP
12288:Ox//yfYb5BIQZVtrdMLIMqn28nJ/w8tPz3WIBdNSj83QZZWq/3K9:KiuBtZWLI1nFJ/tF7EA3sZWqv+
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-