General
-
Target
39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b
-
Size
742KB
-
Sample
231014-d8kqfseb9t
-
MD5
e3b011174462436d3a4532c7cdc273a8
-
SHA1
7273111902f0bed6595bd44de822024c1c6b390a
-
SHA256
39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b
-
SHA512
9ee5fc56ff3082a3d3146791f44086514572d6058b0fc2b31a246b3223de01958f7728ddcbfd937353a56e059065dd1007f4662492544c85b87a0d7cdfbaec6c
-
SSDEEP
12288:TF//yfYb5BIQZVtv+vm+Gz9CZoVfHfI8ersAmkE5wSK00OjccNFcEzg9:piuBtZuv+94oVf/XYQ1RFcE8
Static task
static1
Behavioral task
behavioral1
Sample
39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b
-
Size
742KB
-
MD5
e3b011174462436d3a4532c7cdc273a8
-
SHA1
7273111902f0bed6595bd44de822024c1c6b390a
-
SHA256
39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b
-
SHA512
9ee5fc56ff3082a3d3146791f44086514572d6058b0fc2b31a246b3223de01958f7728ddcbfd937353a56e059065dd1007f4662492544c85b87a0d7cdfbaec6c
-
SSDEEP
12288:TF//yfYb5BIQZVtv+vm+Gz9CZoVfHfI8ersAmkE5wSK00OjccNFcEzg9:piuBtZuv+94oVf/XYQ1RFcE8
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-