General
-
Target
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847
-
Size
742KB
-
Sample
231014-d5qgjaea4t
-
MD5
49d46cb81f01044f2563813d9ff41fbd
-
SHA1
9c7f2e414f91b5b4a06a47491e079d8510b36fb9
-
SHA256
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847
-
SHA512
86f2c9809b7c57d6320c187efe735680a9641f60aba0ce62ba81e97d33064455610c3194f197a583296a7e0096aaafaa76cc223e07d60314817fe708dde3205c
-
SSDEEP
12288:cO//yfYb5BIQZVt31Pi7uFqDIhN6UZeTp3HO65rRyLzmqnFFbsrVI9:7iuBtZtKoUWs5VO65rR0FbUy
Static task
static1
Behavioral task
behavioral1
Sample
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847
-
Size
742KB
-
MD5
49d46cb81f01044f2563813d9ff41fbd
-
SHA1
9c7f2e414f91b5b4a06a47491e079d8510b36fb9
-
SHA256
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847
-
SHA512
86f2c9809b7c57d6320c187efe735680a9641f60aba0ce62ba81e97d33064455610c3194f197a583296a7e0096aaafaa76cc223e07d60314817fe708dde3205c
-
SSDEEP
12288:cO//yfYb5BIQZVt31Pi7uFqDIhN6UZeTp3HO65rRyLzmqnFFbsrVI9:7iuBtZtKoUWs5VO65rR0FbUy
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-