General
-
Target
NEAS.eca9b6f977d54b1c080b2457ca6c6390.exe
-
Size
768KB
-
Sample
231118-gjl4rsch7y
-
MD5
eca9b6f977d54b1c080b2457ca6c6390
-
SHA1
e6528636fd826b4181bc0b1a203837853d6faf7b
-
SHA256
1f8f2e9e28f50f64ea2b24fed246c89072904096e4bc15a3595013e3b34c7867
-
SHA512
2d2defa7e29cde5e66f4721fcd9e376413a304469eb270c432c51e483912eaa6b898a0d2bd35c68258d3ea16aeb7a01a93e5ae33647be8abe4e3f1c1ca2321a9
-
SSDEEP
12288:KMrvy90WGL1MbXI/tgCdgmL6+I3JPYzxJTZkBvu2kvVc+c/QaOq1ywz2HEmZZ7:VyxGuY1gug5+8JPKJy9oVGlywVWZ7
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.eca9b6f977d54b1c080b2457ca6c6390.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Targets
-
-
Target
NEAS.eca9b6f977d54b1c080b2457ca6c6390.exe
-
Size
768KB
-
MD5
eca9b6f977d54b1c080b2457ca6c6390
-
SHA1
e6528636fd826b4181bc0b1a203837853d6faf7b
-
SHA256
1f8f2e9e28f50f64ea2b24fed246c89072904096e4bc15a3595013e3b34c7867
-
SHA512
2d2defa7e29cde5e66f4721fcd9e376413a304469eb270c432c51e483912eaa6b898a0d2bd35c68258d3ea16aeb7a01a93e5ae33647be8abe4e3f1c1ca2321a9
-
SSDEEP
12288:KMrvy90WGL1MbXI/tgCdgmL6+I3JPYzxJTZkBvu2kvVc+c/QaOq1ywz2HEmZZ7:VyxGuY1gug5+8JPKJy9oVGlywVWZ7
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-