General
-
Target
8c4a9ee1177512380614ea451104288412dba5403d91ba1e41a1f3209b1525e3
-
Size
373KB
-
Sample
231112-m1hessff39
-
MD5
ec74f4896f8475f122142b574ac4ee21
-
SHA1
b977d05e096749d42fa6bb69a0f2e40a992bd80d
-
SHA256
8c4a9ee1177512380614ea451104288412dba5403d91ba1e41a1f3209b1525e3
-
SHA512
3def65f4262611f4180e4682f295b6c3d8435823020039fe2f8b7c4c06b4cd50000865e2b82266b59f050a1c6dc49665a7701cd8f8292c28e24f5ac7c4a2fa3a
-
SSDEEP
6144:Kgwy+bnr+vp0yN90QEiLNkxT3IVf2gPB3OOS4XrN0BdEfWxt2Y672PBLCb5NJ/mi:trMrvy90ENkxT3U26AOSoGdq8ZnZK3JD
Static task
static1
Behavioral task
behavioral1
Sample
8c4a9ee1177512380614ea451104288412dba5403d91ba1e41a1f3209b1525e3.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
8c4a9ee1177512380614ea451104288412dba5403d91ba1e41a1f3209b1525e3
-
Size
373KB
-
MD5
ec74f4896f8475f122142b574ac4ee21
-
SHA1
b977d05e096749d42fa6bb69a0f2e40a992bd80d
-
SHA256
8c4a9ee1177512380614ea451104288412dba5403d91ba1e41a1f3209b1525e3
-
SHA512
3def65f4262611f4180e4682f295b6c3d8435823020039fe2f8b7c4c06b4cd50000865e2b82266b59f050a1c6dc49665a7701cd8f8292c28e24f5ac7c4a2fa3a
-
SSDEEP
6144:Kgwy+bnr+vp0yN90QEiLNkxT3IVf2gPB3OOS4XrN0BdEfWxt2Y672PBLCb5NJ/mi:trMrvy90ENkxT3U26AOSoGdq8ZnZK3JD
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-