Overview
overview
10Static
static
30fd60696a3...b2.exe
windows7-x64
100fd60696a3...b2.exe
windows10-2004-x64
102996639955...59.exe
windows10-2004-x64
102acc7bf3a0...77.exe
windows10-2004-x64
10526be697bf...a7.exe
windows10-2004-x64
10537d35bac5...43.exe
windows10-2004-x64
1063e7ea0ef8...61.exe
windows10-2004-x64
106ba7aab10c...ba.exe
windows10-2004-x64
106be7b83314...78.exe
windows10-2004-x64
108155bd24d1...a2.exe
windows10-2004-x64
1098093b29a1...be.exe
windows10-2004-x64
10a03054b15e...e0.exe
windows10-2004-x64
10a6ac7e6221...44.exe
windows10-2004-x64
10b4bd81eed4...04.exe
windows10-2004-x64
10bc3d05e882...1f.exe
windows10-2004-x64
10c423201e38...8d.exe
windows10-2004-x64
10c5e42a3a50...3e.exe
windows10-2004-x64
10cfb43a8521...b2.exe
windows10-2004-x64
10e50cb48894...49.exe
windows10-2004-x64
10e8168dd5ed...47.exe
windows10-2004-x64
10f674a21edd...53.exe
windows10-2004-x64
10General
-
Target
r1.zip
-
Size
17.7MB
-
Sample
240523-w5qreabh3y
-
MD5
3ba80db33a1158b759c80a5da56cd174
-
SHA1
7623588003dbcf9243c9664f562fc139f8621dcf
-
SHA256
75edb521bbb0ae12b7c2c52fa6e3ed769f4e764e26b92ef2dc4d7cb78ed92fd9
-
SHA512
6f7be761def3ac0e248dc08d2510f80526e2dcb2eb4924da036a50fb2d3af4fe894d7c928e5b6b086e8dcefaa6b0270108159ad417a3a2837888c8530e612409
-
SSDEEP
393216:dciNUS6skWgaI+C62OgGGfESZ/YBk45iotK0uxQGkfCyzxp2Uq4zDHo9KJvjr6:dWD0q6vysSlzcKfEBzxp2Uq4oEq
Static task
static1
Behavioral task
behavioral1
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2acc7bf3a0c9793fa35ddb267e569c575a7a142b0722a61a3c49c2e87e994477.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
537d35bac51656a3d24c96fd5d730dbd1b3aa1e40870063892a5c0f247669243.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ba7aab10ca9c6b1705b9de79a2e324a956c2ef5b8210ba6a6fff04274d5a4ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
8155bd24d116c57eab78ae836bd626ad73ea195b6cd88928129bb6fd1f3a80a2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
98093b29a1c396935c62384ecd9e854458334f30f82f78a59ce3c0db9ddc54be.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a03054b15e4fddd11bf2396780295da4431da23bddbec73b70a011da6d19a8e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a6ac7e6221ae1940e4e6faa06a2e255b4e9e7a811c7b3e3859feeaccca699844.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b4bd81eed44be3f83a4d778d3fe1bc914c1e5bca98bb8217707f964f5e0b0904.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
c5e42a3a502b792f98bf1c2a5548dcfe3d99699a1ebd3b1dbbc5eebb02e0e13e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e50cb4889413649fb6e1cca1572c73dae745fb6ad9c37514bfa16650aacbaa49.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e8168dd5edaf1e8b049e5f5e7c1241a1e9e3c746375080bfc3d7dabb994bc847.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
frant
77.91.124.55:19071
Extracted
redline
kukish
77.91.124.55:19071
Extracted
redline
gigant
77.91.124.55:19071
Extracted
redline
lutyr
77.91.124.55:19071
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Targets
-
-
Target
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2
-
Size
270KB
-
MD5
7eeca2cbaccbd7eb357bfa4f623fbf97
-
SHA1
67c43af2316b5b307922d952a0e48680b8270802
-
SHA256
0fd60696a37853b9112e009b88f4a66eb9d6f837b4b77cfe28e58110267409b2
-
SHA512
e986d779f9bc7de5c627e487ad3fa87921b2b404a25e2eec6cb85d2e7cac73660c354e0ebcb134a03fb809e8054f2f20538160343f53c315f620a8f5cbf5f401
-
SSDEEP
3072:VJGkimM7usspGahWcy23rT1YCj2AFnKFCWWCMLfCpBJqs6uRtNeAg0FujCn8odDh:PapK3RlYo26KFCW8m3JqxAOO8+SVT
Score10/10-
Suspicious use of SetThreadContext
-
-
-
Target
299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059
-
Size
417KB
-
MD5
f5fe73580e6061b453e5e52c1b4d1fe2
-
SHA1
e29ff7c20633ba5b052d7bc24e3c056783af2f77
-
SHA256
299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059
-
SHA512
40e96b896ae52e76ce5ed33cb5f68548b2bef2232721eecb2a2becb6f1523dd786778fd5bf454ef51727a755cb5959f69548139232f4cecb84941a3edb319977
-
SSDEEP
6144:Kry+bnr+8p0yN90QEM6uFCuzf8i/mEPtm+aiGEaC9c2fww:ZMroy90ejCuLl/mEVm1iVrTx
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
2acc7bf3a0c9793fa35ddb267e569c575a7a142b0722a61a3c49c2e87e994477
-
Size
947KB
-
MD5
e05b77f28bbe24dd2444a611884b0122
-
SHA1
7bd1124270c5e41e1ae2a31df6140196d57b929b
-
SHA256
2acc7bf3a0c9793fa35ddb267e569c575a7a142b0722a61a3c49c2e87e994477
-
SHA512
0253d333d18904eb2276b4e7408f85b4cdb1804dd1871a86d89749976cd747c4949fdf3938fd9d2faaf377c95475cd345a8c03b8c32234db5b468618dafef3f3
-
SSDEEP
24576:vyMfK22g+/ZdlEnzrsdVEeAWaWYvGJwLJxD5yVoYtrh:6AKuodksvJAEYvVLvBEr
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7
-
Size
1.2MB
-
MD5
bdf7fc6e400c2bc8dafca00732a7b259
-
SHA1
75ba29a05598998dca24bb52c7d311a6fe219c48
-
SHA256
526be697bff16798a7b0db1272f29ee6e6e4a0d2f8779f857ebe162729e247a7
-
SHA512
e13ce7b519e6da87493183e2699f38e5171359e8a824074e6d6e92ba1ad9d29b87db2ece73a79156168741e681728122bef2f666fc274deaf5c5306c41b476d0
-
SSDEEP
24576:7yWodOfzIjZJXcoF7shLxvqA1UcHD7qHINivyoma19je:uWvIZdrF7s1xvqKHD7qHIIvyDa19
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
537d35bac51656a3d24c96fd5d730dbd1b3aa1e40870063892a5c0f247669243
-
Size
1.2MB
-
MD5
cd940c2af93b4093f92294507d63a84b
-
SHA1
829dbf34628ba466b4a3e47a892cfda952854fca
-
SHA256
537d35bac51656a3d24c96fd5d730dbd1b3aa1e40870063892a5c0f247669243
-
SHA512
d63b8ca3cd579dce5071950fb767654c9d5b167ca33986f946d992cabae02a6f01e1f6f5b1630d09cc4658927fa1bcae0799da649061e487f1fd0b2e3d764889
-
SSDEEP
24576:Gyqfq8S2gU9bBeRIEp1rkOWidPnEA+jO406CSVlOjo0pvn1ByeUU:V0jS9wBeRTOOPnEA+jOj66jokU
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61
-
Size
1.3MB
-
MD5
b15dc7860f40ea21d727ada21c858d78
-
SHA1
10bfa760f1a369aaaad29f09084d4c5a2ecd7c61
-
SHA256
63e7ea0ef874b72273a3ea2e8d37753b642423f278258c8297d28ce3024ecc61
-
SHA512
07b4a692a2db2e34c2ca0366e68a495021b4d7c799ebb49fae3f671e97d516f3e14edeb7a130a58bf4e4e3f73a2f4ecc379d2b498f762b20d173ee6b7de15ed8
-
SSDEEP
24576:Qy/hJhEvVPVCZ7m0CWm+hYWrvqfip2d69GPWFh31usKvGV:XfSVO7dyiYWbqfpVWssK+
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
6ba7aab10ca9c6b1705b9de79a2e324a956c2ef5b8210ba6a6fff04274d5a4ba
-
Size
760KB
-
MD5
611d7feaeb5914a5e51cbcfb67f0736a
-
SHA1
f8fbc7b3d0924083169fb7669df028c618e5fe21
-
SHA256
6ba7aab10ca9c6b1705b9de79a2e324a956c2ef5b8210ba6a6fff04274d5a4ba
-
SHA512
bbe10e8e6f5a565b3bba76833a91f25651a1a2e823383ca4634225d99a27907a6c98a680ff0772b88bc0524e51fc881452826d675eef509995ce9e0431248f5c
-
SSDEEP
12288:lMrGy90sxN59718Z6IsiQp3FauvvFV/1nDjbFfL9i1RxZComUNiuUWgB2KG8va3f:zyd97Syp3Fr9l1nbVL9sxZCoLiua2KF6
Score10/10-
Detect Mystic stealer payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478
-
Size
421KB
-
MD5
a724995af13018d9a70245cec8f7678c
-
SHA1
0a6821ee014bbc65ba0d5d93a0f9bfc27a59b8a7
-
SHA256
6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478
-
SHA512
ab2e981992379507a8c9ad0e1863022df69199815ee0637a794009487529baaa937f2f20538a8311662f18a45f4bb0d1d9838addca80925aa5693df89c9c9d90
-
SSDEEP
12288:XMrJy90h+08qFUvuohyGkUvWZ32N5spIb8lEQi:yyj08qF3oa2NPb8+F
Score10/10-
Detect Mystic stealer payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
8155bd24d116c57eab78ae836bd626ad73ea195b6cd88928129bb6fd1f3a80a2
-
Size
1.8MB
-
MD5
ae40dabebed6d3bb557de110ec0c6c54
-
SHA1
d67d82f55b82f90fe157f17f7978697376aa2934
-
SHA256
8155bd24d116c57eab78ae836bd626ad73ea195b6cd88928129bb6fd1f3a80a2
-
SHA512
77a03e86e2235d01319d484c271cad80cae6028d27af25c2158e22c93c23692a8456bad7ef20dd8e1d65f5c77314ab24c3d378a68c618692f96f8c5509ee13c7
-
SSDEEP
49152:9tH2hfpwhXRnvMM3eWH07UnnhnXn3kDQ:725pS9t9Ki0c
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
98093b29a1c396935c62384ecd9e854458334f30f82f78a59ce3c0db9ddc54be
-
Size
1.1MB
-
MD5
689af04893939e7333c5ab54564327ac
-
SHA1
b5a3cb2db8caf56327c79b1378e69a8ee8ddc764
-
SHA256
98093b29a1c396935c62384ecd9e854458334f30f82f78a59ce3c0db9ddc54be
-
SHA512
5220957905fbe451ab40d31194e1515fc814fec6fe4284d77085dc1ba14285124d3bb37554f104db87d076341a07d84d2fd68938a5c042adf18c87f0e570e04f
-
SSDEEP
24576:Dy9FhmM9/epbOxTHMVL6Ehz/XKGts/RYUPVTtSMoxICJ626P0mW9P:W9fmM92pbYsVLnDK/qUV8Moc0
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
a03054b15e4fddd11bf2396780295da4431da23bddbec73b70a011da6d19a8e0
-
Size
1.8MB
-
MD5
f9690a36ed94deca8bf89850e3b11e42
-
SHA1
1c3fb3887497b5ae9e209f81e67b7d094e77a0a7
-
SHA256
a03054b15e4fddd11bf2396780295da4431da23bddbec73b70a011da6d19a8e0
-
SHA512
720c0d7c4680551cb4ab1fc0bf16e3d20a4e6af6747db7d20d76af55591e70da37fdb2ae761be258f7cfb0e1665c1d50de88d6edb09bf1b031697c321324afb5
-
SSDEEP
49152:+yXE6GXtxv57edxn+xA5kntPaqP5livt8I7:9U6YxvMdl3iFW
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
a6ac7e6221ae1940e4e6faa06a2e255b4e9e7a811c7b3e3859feeaccca699844
-
Size
824KB
-
MD5
f8896aa09cbf341133389cb3879cda71
-
SHA1
76046da72c2c2e920522051abb913a34e6bc3247
-
SHA256
a6ac7e6221ae1940e4e6faa06a2e255b4e9e7a811c7b3e3859feeaccca699844
-
SHA512
348b33b83cf63f3bc543a00f58be4311e08aec4fb743ff49275e86bea02471538fc99f88663fd3907076ef3f874b20928af47eefd30a679e842c7794b0c7ce44
-
SSDEEP
12288:PMrny90Y58rHbQA4c/v7AaEzqIf9bOufRtL5V2dxWHH3jvzIOS7i4lpvuNxmrRFI:8y2rHM4ALEufjixKTvzXS7ispXFFXY
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
b4bd81eed44be3f83a4d778d3fe1bc914c1e5bca98bb8217707f964f5e0b0904
-
Size
936KB
-
MD5
4440531ebafc2168c09d9f1564b9d79c
-
SHA1
63178757582dec4f3f7587693c46d8fefa6c3ad9
-
SHA256
b4bd81eed44be3f83a4d778d3fe1bc914c1e5bca98bb8217707f964f5e0b0904
-
SHA512
226e5a33ebe5aa1cd9a1dc3c2575e9413620591298d53cc5d7c8ceaefd8d81d494b8efe18d5f0b0c5f06f18d17a27f7130305224bea7922b476ff15576de7bad
-
SSDEEP
24576:jyapEYWP1adbcE7bMKOp64nxuY9JRKsSFfAZDZqS:2aBVdbF7bMKo3nx1bRKnON
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f
-
Size
815KB
-
MD5
5f588bc47b5093eaa5d3a9c0644b0fa6
-
SHA1
45386aff33a4247f8d51572f604b93a7c42ee96f
-
SHA256
bc3d05e882eb83b7ad915dd2d33d3be8e73bb42e53f26b9662f99e79511e361f
-
SHA512
6d0383da806a084f87f436ef1413c4d51f53c036c3b2fa06513f398ab8328793c910b775854fc6b512f6b33add8abc57660bf9612954420dc393c70661533ece
-
SSDEEP
24576:syeR6ovnaM19/cDqmCcYge61HxqCSKcORi:beR3rmIAHxkKcOR
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d
-
Size
1.1MB
-
MD5
18446e1501e63e0019b372fc4029f123
-
SHA1
c9d615ecc9559924632f68869510166c921dc59f
-
SHA256
c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d
-
SHA512
05d3f76c722a465e23ecf0961021767a41e7abc2f1b1f13be75300b095521e2eb58e2159311403753429349176d6821e67dc5c8fa46486db71252dc9d30d81e9
-
SSDEEP
24576:pyMC4dJevkZml2/xU1WPWz6MuFZeVYOQrekxPuLuQGZyA3aM:cMCiJeMR/xU1WPe52sfkxPuLu/ZyAq
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
c5e42a3a502b792f98bf1c2a5548dcfe3d99699a1ebd3b1dbbc5eebb02e0e13e
-
Size
749KB
-
MD5
a488dc8386a267e2acce14f3d1555b2b
-
SHA1
c430f860139a9789dce9e649372373c5404f384f
-
SHA256
c5e42a3a502b792f98bf1c2a5548dcfe3d99699a1ebd3b1dbbc5eebb02e0e13e
-
SHA512
b8f58f66d108d2891a070bf3fb2062f260626fb38f65cd9cc729c176e3e2e0b39eef01567bf5f8ab1066b26d7ddcb11a080cfc35222e9a8f97a1fca62bcb35be
-
SSDEEP
12288:yMrCy90ULBNqxe1t61hnIXvVoEpvX3KNzpdty6t0b1f3OAm/NyvLdOkaAl2TH:AyZOY1t6PnO5p/a7jJM1+1/NyT8kqH
-
Detect Mystic stealer payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2
-
Size
1.2MB
-
MD5
1052f8a9850ff2cdb3305c4693fb3bc2
-
SHA1
32363959f3f2db69aa1311d268affce5f7e5a130
-
SHA256
cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2
-
SHA512
1f65110317fc5bea56d95df856de912aae3cbeea853d62fcbf0487d47de212fb95740d6400088177bd1a313932df06460547a68910b2d62d4362cb6d895908b7
-
SSDEEP
24576:Py8i+Ca4HSc3QJthXZ+8LKwtWPoq+aNQO418UgpMc/eSpQ:a8i+CmuqhJswvq7OO4WUa/eSp
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
e50cb4889413649fb6e1cca1572c73dae745fb6ad9c37514bfa16650aacbaa49
-
Size
841KB
-
MD5
f025917edad34f0971f4b62b76003de9
-
SHA1
35449daa9b1d2b0ba53897b43dd9f40a0ea782fd
-
SHA256
e50cb4889413649fb6e1cca1572c73dae745fb6ad9c37514bfa16650aacbaa49
-
SHA512
31e4b993c86c3e913da3049110ee66570b238b53223dccbf7b64587fd8c19a56490d410640d721dc71f9df7ce5f0ff3ed755783cdd2670148a7b5984d99f8225
-
SSDEEP
24576:JyRTYigN40cVYvpnc9gqPts8M/afOFONn:8RU3vcVSRcf1s8mafOFU
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
e8168dd5edaf1e8b049e5f5e7c1241a1e9e3c746375080bfc3d7dabb994bc847
-
Size
472KB
-
MD5
200604b5e079ef62ee499596045e855c
-
SHA1
61571e9ae4ac5af5f38f80da06a4071cf2c4bf22
-
SHA256
e8168dd5edaf1e8b049e5f5e7c1241a1e9e3c746375080bfc3d7dabb994bc847
-
SHA512
70aea25b97004fc0b531251992939d62b804936efb005c0c574add40d7a17e0b5c0228bd48e5c3b1d5d66be96c6fa39f58f2f3729321c5abfee231b654fbf2d0
-
SSDEEP
12288:3Mrby90DkrKaSYbxfqaqAr6/A0IoKX6pPl1Z2SqUiP:syG2Swx3q/A0Io66L18SoP
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53
-
Size
605KB
-
MD5
9a6e6c325ec6dd023c76243100c08bde
-
SHA1
ad3a4a56867514408546b8f0322b96dbc7288d8d
-
SHA256
f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53
-
SHA512
9a9711f2d290ea6b1ff8e7f3cc5c11a0be87c6a09ff1b608a9093febc35da58ae5fb6cb3a8e59fefbdd151305504af17d362cda27c517db2d1115c755ba8a179
-
SSDEEP
12288:RMrUy90aIl2VtsnMvNDP2LftanwopFV8OL53AHHBh/bCf:ByvVdvxP2LY/r9iBs
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1