General
-
Target
fa48071f5b369e701ff7ffabd8b9e145ce609099ce9eb6acdf0350db11846b5d
-
Size
742KB
-
Sample
231014-dkgnwseh42
-
MD5
d2340b97e95d6c431aa25355d6ab59a0
-
SHA1
3f1a7a5ee382527d32e53b8b1dda700fa8c79e58
-
SHA256
fa48071f5b369e701ff7ffabd8b9e145ce609099ce9eb6acdf0350db11846b5d
-
SHA512
dcd88418eb82164a33422bbdb3557fadbbd7fad4f5bb1ad5d81f07e1a37e1dfe53c2ba02b7cc0cfd138d940031b0fc352e3e52b4f7027e40547ba59251620bfe
-
SSDEEP
12288:Ud//yfYb5BIQZVtfw6qdqxjdWqyVAtcUpccj6p3C0xxc0uReh2k9:0iuBtZg6QypWqgAtcUx+vcfeAE
Static task
static1
Behavioral task
behavioral1
Sample
fa48071f5b369e701ff7ffabd8b9e145ce609099ce9eb6acdf0350db11846b5d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fa48071f5b369e701ff7ffabd8b9e145ce609099ce9eb6acdf0350db11846b5d.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
fa48071f5b369e701ff7ffabd8b9e145ce609099ce9eb6acdf0350db11846b5d
-
Size
742KB
-
MD5
d2340b97e95d6c431aa25355d6ab59a0
-
SHA1
3f1a7a5ee382527d32e53b8b1dda700fa8c79e58
-
SHA256
fa48071f5b369e701ff7ffabd8b9e145ce609099ce9eb6acdf0350db11846b5d
-
SHA512
dcd88418eb82164a33422bbdb3557fadbbd7fad4f5bb1ad5d81f07e1a37e1dfe53c2ba02b7cc0cfd138d940031b0fc352e3e52b4f7027e40547ba59251620bfe
-
SSDEEP
12288:Ud//yfYb5BIQZVtfw6qdqxjdWqyVAtcUpccj6p3C0xxc0uReh2k9:0iuBtZg6QypWqgAtcUx+vcfeAE
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-