General
-
Target
766b24fa348dae29cf2d310756548e58a3d75474bb7e202389c1c88f3b42b5d0
-
Size
742KB
-
Sample
231014-da9xpaed83
-
MD5
35c04da6dcc578c312e8e590cff8eed4
-
SHA1
375733dfa70be5ddea802fd54b69d966a185f612
-
SHA256
766b24fa348dae29cf2d310756548e58a3d75474bb7e202389c1c88f3b42b5d0
-
SHA512
d4f53f4abc3ceebb92b520fd2078cc74fba4423529e7ce68af96f3776b3fe8dad4dac061e2b53e655dc2904e390ab3bc729904d853a660ec1397afdca38e3b88
-
SSDEEP
12288:+B//yfYb5BIQZVtZRvpjygvE+bwTITZ+oX7fOF6rWvca/MdjYW+YS9:aiuBtZ9pE+bwUT4oXxrsz2m
Static task
static1
Behavioral task
behavioral1
Sample
766b24fa348dae29cf2d310756548e58a3d75474bb7e202389c1c88f3b42b5d0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
766b24fa348dae29cf2d310756548e58a3d75474bb7e202389c1c88f3b42b5d0.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
766b24fa348dae29cf2d310756548e58a3d75474bb7e202389c1c88f3b42b5d0
-
Size
742KB
-
MD5
35c04da6dcc578c312e8e590cff8eed4
-
SHA1
375733dfa70be5ddea802fd54b69d966a185f612
-
SHA256
766b24fa348dae29cf2d310756548e58a3d75474bb7e202389c1c88f3b42b5d0
-
SHA512
d4f53f4abc3ceebb92b520fd2078cc74fba4423529e7ce68af96f3776b3fe8dad4dac061e2b53e655dc2904e390ab3bc729904d853a660ec1397afdca38e3b88
-
SSDEEP
12288:+B//yfYb5BIQZVtZRvpjygvE+bwTITZ+oX7fOF6rWvca/MdjYW+YS9:aiuBtZ9pE+bwUT4oXxrsz2m
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-