Overview
overview
10Static
static
3131b47af99...32.exe
windows10-2004-x64
10227ab56ef5...eb.exe
windows10-2004-x64
104537f51b0d...4c.exe
windows10-2004-x64
104852dcede8...5b.exe
windows7-x64
104852dcede8...5b.exe
windows10-2004-x64
104d68d381e4...34.exe
windows10-2004-x64
1062d27d23e1...d0.exe
windows10-2004-x64
106f4e5c3b3a...2b.exe
windows10-2004-x64
10775b7a0479...3d.exe
windows10-2004-x64
1080a8dab579...f7.exe
windows10-2004-x64
10a28852a355...af.exe
windows10-2004-x64
7d02a87f385...3a.exe
windows10-2004-x64
10d0c1074be1...1f.exe
windows10-2004-x64
10d427832084...e1.exe
windows10-2004-x64
10d53f5a64de...d1.exe
windows10-2004-x64
10d62198c81d...0d.exe
windows10-2004-x64
10dd0f820c33...a3.exe
windows10-2004-x64
10e3c377dc6b...f7.exe
windows10-2004-x64
10e9172c1691...86.exe
windows10-2004-x64
10f6c86e8cbc...da.exe
windows10-2004-x64
10fbd8d72f7e...0c.exe
windows10-2004-x64
7General
-
Target
r.zip
-
Size
14.5MB
-
Sample
240524-kghv4sbd54
-
MD5
5369caa7a9ccf5163091b23db8c6085a
-
SHA1
a65dc4b3c0fc03dbd941bf5f4c8d16b1d939976d
-
SHA256
3cc30911c3eb32deaf5fb8bc4dfe2ca6abbafa106ab4c16e8ff25a715c1fe7e7
-
SHA512
f0d84d380b07099fc60b05d1aec2967bbf102e8de9033db77e698984b58c0c46db0c998cd97ca488772be825ffbb62b3c76364838b7ef8347fced22542d2b4a8
-
SSDEEP
393216:qNAGAzaR8hlxkf12JnCzah1v10LFKy7kfrcwy8aba/C7ujSaB:qNAdE8hPkMJCmr90Lqw5nmcujS4
Static task
static1
Behavioral task
behavioral1
Sample
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
redline
gigant
77.91.124.55:19071
Extracted
risepro
193.233.132.51
194.49.94.152
Extracted
redline
magia
77.91.124.55:19071
Extracted
redline
kukish
77.91.124.55:19071
Extracted
redline
breha
77.91.124.55:19071
Extracted
mystic
http://5.42.92.211/
Extracted
redline
horda
194.49.94.152:19053
Targets
-
-
Target
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432
-
Size
930KB
-
MD5
0cfe607a0e71e8e8185964b116396f08
-
SHA1
67406c6194bd8455a7f7112787cef8ecfc17d060
-
SHA256
131b47af993204905e6dd4dd4ff06b43cb1a0fe2e2b140520d4962f73d4b6432
-
SHA512
1e3bf90ce8060d336f4eb45e920c6d6b544fbf3eb70cbe5a3f15d1dac8c385fca16409aaedf2fe6d72bd8e1a144d61c21ee3ef7dec7c21d79f2cbb6244c3d049
-
SSDEEP
24576:iytg+WfHZn2cMrrPTotPR47e2EmHTsjF7k6:J8fHZ2bdilNk
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb
-
Size
417KB
-
MD5
29661c435e2a1539b16d18c8cf3e89e8
-
SHA1
f7b2baf441d7712466af4b2e5b421fac1cee810f
-
SHA256
227ab56ef5937ce1494f5b0cd787a052c624e8a674162dba77f9c8d6aebfbceb
-
SHA512
58431e6f238d97c73e19cea639f403a7fd53bc95f67586b443f28899f834a7f0f6f1e659cfc209c194ec1ad621c70ef451445458df71b5ec466bb4b5ce24270b
-
SSDEEP
6144:Kdy+bnr+gp0yN90QEGQk1IFT7XtSbixnWrMiO6Z3ry4cLclR07Chm6SsHOpi:zMroy90BUIFTVncMiFYSlRa2HNH
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c
-
Size
918KB
-
MD5
b8365d87b8119c3374d71028fbe72382
-
SHA1
baa6b90ca7d0c8b3649819e5255c5523d7228740
-
SHA256
4537f51b0d234db42162223f94f6617d6df0e7eb077362a4b5249ab8da1e684c
-
SHA512
3d074a6e1fc5c1a37e75d656b21cb48fe384b287c007018f436e4e33d7f471703d884bb7f99931607a97885ecae0275b8e508e48bad56d26ef2cfff0480bc252
-
SSDEEP
24576:SyfJi0RO8s7j4giInc2xlkIYQ6F0M2kjStFS:5RfyjhnWzF0M2kjKF
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b
-
Size
376KB
-
MD5
d31797dc0f17f69e5245e0a452aab2b3
-
SHA1
9bd1e6981d8cde9f7db98540711101cd57ead02c
-
SHA256
4852dcede8c2a79b77049fad052569e7900c43963519e55522590fd06b2c0e5b
-
SHA512
7de1f6f6b7354e684e0850fe3149253cddb01dfe9e7aa692c100e52f62ce5875a73d051a5f90c2a58fb78ea17c4fb46f706ae55c5afb694cf2315370230985f2
-
SSDEEP
6144:V93K5fykNFVr5ywuibFEr3dyYAOI/CsqfCJijYXF7Z/2wk6CJOn0ttp:V9a5frbVr5ujxu7qfPjZT
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-
-
-
Target
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834
-
Size
1.2MB
-
MD5
56a2f2d0890ff16eb044b0a5778e7867
-
SHA1
72ba83d1c6ed4ffaf733b1568d0d6398dbec43fc
-
SHA256
4d68d381e45f27176b76095693f986c42472611f4598e13b214a1c40acc89834
-
SHA512
115bd5b7617d63697c0de243e1e3b6544708d50c5a6d5c160765b838992ceb73b73f19016135e7fd1c0e2d70200c5e769e162952bda324a651d34f1eff72c9a8
-
SSDEEP
24576:dy2i20A1nLmftA2TpmFJeqRzEhzasUml7gGt0ssGXyQl4Fj:42eA1WbTp8RKesUIzl4
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0
-
Size
1.3MB
-
MD5
eb745fe2c2df0c9642e60c076ebbb8a8
-
SHA1
cd9cf0966d4be269ab50bfb98635a74a0e958f57
-
SHA256
62d27d23e1f8603e95173890b3a03815aecbbbba3cc357aa36aba1f8374397d0
-
SHA512
dc88627295a2e54b31599818e335fc3e76b6ebe53e0d23a0405270516446c4325769b5f0772f30502c22ec92e30cc8be0fd4192937436f3d5395c678d0845db8
-
SSDEEP
24576:oyM5I8I2r54QwinOnVK7oOKTX0fNRDgKwkGtUO5qcZ+ifXWp7B+WpwJMVd:vMCTQwiOVaoO7TwkGCO5qcI2mJAWpK
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b
-
Size
811KB
-
MD5
91d88f49ab29b31c90140453f78f3a17
-
SHA1
d4fa424afe634eb614ee8f0bbcfadbf766f7f921
-
SHA256
6f4e5c3b3a8de995cf390c778532164b570dcf1ea9c58ab8797a7cc16a674a2b
-
SHA512
bb04a4e664f48b7242dcaafc224ab91ec036fa58bc71bdd2a3ed1586b291e38229df844c0ceb666e77645895f95c65b4010d0228ae18beb6f0c82085628486d8
-
SSDEEP
12288:hMrPy90NL1K7bAhMzYjFnTqZImauCVpXaMZKjRFdH4lUbpvzK8YRIFK:ayAL87bsjZNmavVpK+KtFdH4mBE1
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d
-
Size
1.1MB
-
MD5
30ec8753ba08b1b439e43e84a4f02e90
-
SHA1
a872df7ec9adaa22035b161ce6dad745e89a5a5b
-
SHA256
775b7a04793f8621742cc362f51bef7b4d75b10169fa3493b7c9f713d38fa73d
-
SHA512
593f922e0291eb7127041f4ce9868924817a3534d4dc67d69bc11127b721f2f33bb477654f4d74828d004d29c5862acf9f3022b706f2080cf238b8506325bd60
-
SSDEEP
12288:+MrQy90QW+wWzj3Q6ks5eE/2NowcE/WEaDSEHxm5QsVGdqZnZQqHSqSyHU8GB88j:CyUQrtJE/WEsSWI3VlZQuhGBPni3O5t
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7
-
Size
825KB
-
MD5
400ee7963deca8fb4b658dea29bac901
-
SHA1
f50fbbac4ee390ba843902f113d878ae566e0d3c
-
SHA256
80a8dab5792d1a02e87ec84b22f15eb4bbac6d7635c605250fb1379296e8ccf7
-
SHA512
4b0279621e180bbaa57368e9298d1e9450b78927432020b314764de367b9747fd0b99cd636ef1d25177d54f50d190f89436ef1b29b9a8a3bbacefe220c9982ad
-
SSDEEP
24576:dyqpCSjfWexX/E0LoGYRV8lhQkQBJLZ/:4o9jf3vE3RV8QtB
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af
-
Size
648KB
-
MD5
87c2bf856d8dc10849144dede5202769
-
SHA1
9007a486e18cf372b8ddf8a3bd413cdef9381f93
-
SHA256
a28852a355422f5e5dba04ddfb954e654687e210441a284402775d3dbb8392af
-
SHA512
2e85590e7463ad805b241a1883031b133aaf7be970cc0c9b85817fa457694fed66dfc27b77cac58f94c00ffc17181e15b35b739ff1851ff423ce9d07001456cf
-
SSDEEP
12288:rMrBy90DKGyD0LwL855NjeJkV1CmhQajfz9Z5Q8h6JBz0Lc64V:eyV0LwCjeJkV1CWNZ5Q8h/Lch
Score7/10-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a
-
Size
789KB
-
MD5
e901a5126b5649aa0c7b248de33fe187
-
SHA1
b6a687468d47f518bd517ea63e8a8a53fdb11d8f
-
SHA256
d02a87f385dee50b4399336265bbf8fe7f692201914bcb50c64ca95a35707f3a
-
SHA512
96376d282f7f1af7ca4ac42367dd13e7b6aa5cd284a6b7cbbb1223a8846ee9d4f4976d0d76754c3fb9fcc9689278c803a6dda1b2e9af4fd4e2d8985affa124c4
-
SSDEEP
12288:NMryy90YN8degBdF/RIqaSVJ3zQFo/DiK+BZhzSLU2qQCNQmhZNyztJqkT2j:nyT8dTBd9baS7QW7lkzSFuCyyz/kj
Score10/10-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f
-
Size
1.1MB
-
MD5
49d567d32dd0c1e1e61bf5e848c46345
-
SHA1
84a6f4f0b064e024c714d235de7ad29e60831730
-
SHA256
d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f
-
SHA512
d6e6e2ad69dc513fdf17b0502fa97f9fd269cb6269743050e4b3768a2b34cd52fbc7c852c6a6a3a00f912d5c2c6b17ed40f7f63583f3f370b74e9257bc2b74df
-
SSDEEP
24576:Gy+DubI6MnVbrroOWonnRie4FLFyHm9M6Scvr:VUQI6M93oOWEnRie2LFom9Mb
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1
-
Size
382KB
-
MD5
6c3d6a9ec51ecc2a6a3d5a9c2dc110cf
-
SHA1
963481fb03f578599ae2a1f891e1c4e543e3f7f1
-
SHA256
d4278320848f0e71f678149e0b9ee4ecac3b5305400ae7d69a7131364d60cae1
-
SHA512
9d6089355195b763262cfe6085161829d7896fdba1ccd6fefe9ac0021f80154ca455151a322116b8a50e3fe84918991b2a136500006e0d0a773cc7a2cca246e9
-
SSDEEP
6144:Kyy+bnr+Up0yN90QElUJW+qa+JH06d1stdHzliEmcQPoLzk72b03tZcjtJRiJCU:2MrUy90PUAnpeKCXTliEmGzC2wc5riJ9
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1
-
Size
383KB
-
MD5
1b5eb87432b4697dac2f152e9d5be6b4
-
SHA1
f0750a31de57e8343d78a74db781a6c68cb9af96
-
SHA256
d53f5a64de740270c801f8951781be9743b4ec40b8b353271cb0cbf0a4c8b8d1
-
SHA512
3a1d09762eb036305cf7ba74062c4071f7c055980443ea240ddd8fefe84a1d5f6d9c7808dc1b36f698a792ced50e5f27c133e0c5ef0aae85283b91f65b0129ef
-
SSDEEP
6144:Kgy+bnr+Dp0yN90QE/j6LJ7Yxxs4CiSlttmxxk70t7iFuK5V67ufgSx:8Mrry90t69CTx8i7iNU7xy
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d
-
Size
839KB
-
MD5
ff24fae8745206c4269b6c6fa50b1639
-
SHA1
3528935a1c923cf79eb507bdfe79e0af92dd7f79
-
SHA256
d62198c81df0ae252c179f6cb6041efd2bb2aea225a387a06ee457bcd7d5930d
-
SHA512
46bd86945bf49339fb278337a13e0a52939673a4cd352c1dd2eac551e12bd56e12a50faf7f62da3d935b161ae9d8c6779ffc7130923d735c05f6a750547a5bda
-
SSDEEP
24576:QyObegToqBD6bfxbOqgsmK//21X7gZYQeQAw:XhgHD6bfxbOgm2l3
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3
-
Size
1.1MB
-
MD5
157293e9ec48c365745959b8300b17e1
-
SHA1
6e47a29b6f96c9a5f18dd25afc2d8e2a17792dc8
-
SHA256
dd0f820c33b1cedd17049cf9b5cc18637676e9aa3cfaadbd8f19144e345b7da3
-
SHA512
922146ea84fb7fae01c153329ceba4e265db7cfde77c38f3199c8d09c243a0ea12807297691f6542581c8e5b74aaa4e268c20d6d4b65639313364815fcb259ad
-
SSDEEP
24576:HyMyx7uQwJpYPGJiYh2uUT0IG+HuZZx40dJcZv3Ph/KOSyUAPZ4KX8P:SV7uPa8ignrMHuZ0sOfP4yNX8
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7
-
Size
382KB
-
MD5
2600d98c44bf7addf229345421746121
-
SHA1
5909cb291178933b0f40491f4ab2c43369fc7047
-
SHA256
e3c377dc6b3cceb0b4ae2fa0504de53fe1dad61a6bb656af0994220dfea6bdf7
-
SHA512
336ba8bf7b5a9c335772611b270795fb9b935f25adb757932c26e453798dfda6ee3ef20e48d749d8b99a5453c8e5ab4303e90ea50aea58dcbd5b68e030df81c0
-
SSDEEP
6144:KDy+bnr+1p0yN90QEY5IfJpscWaUBETleouHWxRgvjbjVMEKdB:lMr5y90Ku7sqFzuHQM7KdB
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586
-
Size
1008KB
-
MD5
100602fe3e9beff6fafb32f8be16a64d
-
SHA1
93941e2aae1f0f717c72cb708f41598b24908df8
-
SHA256
e9172c16918ce5309dd65e1af444189e955a30b3ccec8e619cf23b147ebfb586
-
SHA512
db129a290ceb46fc264dabd3dca635860678bf936ae69813e7ab4a2efcab608a38689bb18b4219e3c19f264baa0bcc5997811a0a6a8181d7754a5ad28c310839
-
SSDEEP
24576:jyRyvg2jeg6TBTHnRO2erkrkluTI7hLdyVS:2G36TBTHrikhTKa
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda
-
Size
381KB
-
MD5
6989654d4a8e854885b551c22957d828
-
SHA1
ff366f5fcb1208c106f4415722c3dfdc83e5cbbf
-
SHA256
f6c86e8cbc27556d873bb54eaa4778cf8529fe90df5c8b3070e8ed040254afda
-
SHA512
2ac699e41092271a137ea2609d9b556a493f2ab1bd3afd5b7a4300a5a3a90e8639451a10c04a48f07d4053ac9091670a3353b223f109e7f81332cb5569cff161
-
SSDEEP
6144:KBy+bnr+np0yN90QEBgipOiI8821AgFFBKmbrIkqlq8HCtYpJUnfCKM52U:DMrby90DgWOW8sEmbrIDlq8Hh7UnKKMr
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c
-
Size
819KB
-
MD5
7cfd257b34fae866ba8aaa6df8b08c12
-
SHA1
cda2df546de510f73a7d41977e0725e4f3180ac3
-
SHA256
fbd8d72f7e8046c650efa73c6d984945abfe9952bd8f67360b4658fc5138e70c
-
SHA512
2a2e2a75b1f149d9304fe66690e7a2a712b17af9a6da0ede0870e137bad74243392fcfcfc564e79055913990976da8895bba3bb8755323064876e5f5e4dc125c
-
SSDEEP
24576:uylD/6lNdDsTt6hNZP4UdJcVqNqhvKDiyU:9lT0Pa6hNiMMUqdy
Score7/10-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1