Overview
overview
10Static
static
309d331a688...e1.exe
windows10-2004-x64
100e5a6d1212...c7.exe
windows10-2004-x64
1018791f14fb...49.exe
windows10-2004-x64
10192d57a5a2...25.exe
windows10-2004-x64
71f41b39d2b...10.exe
windows10-2004-x64
102298c18576...bb.exe
windows10-2004-x64
102ec7b7ec25...b3.exe
windows10-2004-x64
102ff63e4636...cd.exe
windows10-2004-x64
103105fb3a2c...f2.exe
windows10-2004-x64
105233b9c00a...79.exe
windows10-2004-x64
1071ffbb500f...63.exe
windows10-2004-x64
1088b74d8884...16.exe
windows10-2004-x64
1093a899efb0...54.exe
windows10-2004-x64
1099144a8cae...06.exe
windows10-2004-x64
109c6fad81c8...19.exe
windows10-2004-x64
10b0c7a00ab4...9d.exe
windows10-2004-x64
10cbf1175688...f7.exe
windows10-2004-x64
10d722251ee6...28.exe
windows10-2004-x64
10daa8bcc1da...f2.exe
windows10-2004-x64
10e2046b06e3...39.exe
windows10-2004-x64
10General
-
Target
r.zip
-
Size
22.5MB
-
Sample
240524-mxkqraed49
-
MD5
18bfae76ab819f24d88fbfcb200562d1
-
SHA1
c3764f0492f1588f97d8e66e3f3dcb17d4507fa1
-
SHA256
3bad5318d1eadf9f6d544fc5ed49c1e737fb2db130f60b70bab6f26392c87c30
-
SHA512
33ee2df1d3d97ffd27a748581c249bd6db15e0d79166bab10f52b1b44ea5c849ea311e0d2a4d9df8d5b106f885cb64910ae32da34a0b39177c957ed7437c42ae
-
SSDEEP
393216:djKXkNMCwwfhtdWpL5K/0VWxfOrM1U5RmpDa/ZqBvZvS2paNWqU24rQnbEHvU:9KUNBJWO/qWB9J5a/ZKvMN15eQbEPU
Static task
static1
Behavioral task
behavioral1
Sample
09d331a688384c2805b4ec4c498f7514d5a4bc6b953eff0ac62ec7820785b5e1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0e5a6d1212e96cbec9340713347cf31edfd53309be8f47f64e346582b70d4ac7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1f41b39d2b8ae20411682600943b3adf98567e247168192fb07ff103e71c9710.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2298c1857648a2d03e7260fec6bd85ba96ff550973a7c8df1efc3ff5ee212abb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2ec7b7ec25de047e7eb1cd8f27cc8f7e111c7ac68d37c56e3938dee25147cbb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
2ff63e46365253076d5f6b65419f2c4110f1ceb32dbb57c43db28076bdd031cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
3105fb3a2cc9654d1eac3354da0a10dfc792e32266a2a7a18fe16764e0b6bff2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5233b9c00ad7ff437dc70a2133e2e6251bcd63221cf9acbc7f1f8b00c9305c79.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
71ffbb500f4a8485edaa4aaeea3a716a9bbef886b7e16859b9f251f26a975963.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
88b74d8884f09632e668bea54668a44beb33e28e6d34636e7b8888fffc0f0f16.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
93a899efb0c194800223fca15c717009673f08a1a62d33fa602dfbcbc0b26454.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
99144a8cae61109b46016ef756589ba3aa71222da541e3bda432b738f7469d06.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
9c6fad81c8c5b4e4185f597e8ecb47fd56f1147c7c2bc851eb0e36a99fa9b019.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b0c7a00ab444001cd63f40a54db27100ea773e014721080a2b1279c33f37269d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
cbf11756881901fd292b570bc3bb19b579c924b2d7f37bb2cf69de109a1da4f7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d722251ee6167c7e35bae3b84b679d483609f718be9b0d4851cca6d9ccfdee28.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e2046b06e3810ca229ccfdfa24bc43ef690f3fb1808988596f1eec296ceadf39.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
193.233.132.51
Extracted
mystic
http://5.42.92.211/
Extracted
redline
lutyr
77.91.124.55:19071
Extracted
redline
breha
77.91.124.55:19071
Extracted
redline
kukish
77.91.124.55:19071
Extracted
smokeloader
2022
http://81.19.131.34/fks/index.php
Extracted
redline
taiga
5.42.92.51:19057
Extracted
redline
kedru
77.91.124.86:19084
Targets
-
-
Target
09d331a688384c2805b4ec4c498f7514d5a4bc6b953eff0ac62ec7820785b5e1
-
Size
1.1MB
-
MD5
a27c8f92315fff917e750c7b89355067
-
SHA1
f65c7a885fddf4bf583dbab9bc512e789aaba54b
-
SHA256
09d331a688384c2805b4ec4c498f7514d5a4bc6b953eff0ac62ec7820785b5e1
-
SHA512
e73ce1b88e20897d61bb259b0ca7110684c734add5ca22f7ed919a9d1fe711dd42a2b58b4a8c359463e29720770ae2ec12d9853d6be390d2f0eafff828219364
-
SSDEEP
24576:eyHOpuii4QQInraJDD2qk1cFF7K6AFjv6ojMmDo9kQaYo:tHUi4QTraDD2qk1a0fzBVWx
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
0e5a6d1212e96cbec9340713347cf31edfd53309be8f47f64e346582b70d4ac7
-
Size
1.4MB
-
MD5
7837fbac380dc8a10ad779861b8ee3db
-
SHA1
bf713fc0637bcce4923f8ff4beaf7aa59e3505fd
-
SHA256
0e5a6d1212e96cbec9340713347cf31edfd53309be8f47f64e346582b70d4ac7
-
SHA512
b5d95777ce044dddd1c58635130f8fa80ad0ea7f70fa22c5e28e0109c1b531f6f26598bc7518f1bd498439bb8dfbaf248b6eb4f54d6f83bf8b382f8325eadef9
-
SSDEEP
24576:GyY5vgwLFrmztJHfpp84qup6DeEFO/gZ3Ufui4SyDUkPUYvnbAQsvcl:VYFpRrmLZqup6K2OohHkyDUkPhPbAb
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749
-
Size
1.5MB
-
MD5
b23eabcdc1fee8a2709e000cf0b7ddad
-
SHA1
31970d062ede14d475d8eb2bc32700bed180b876
-
SHA256
18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749
-
SHA512
e9876a547eb5a78221e37b311af3f5aadbd28bb172dcd7aa53a80dade36c468922b3e4ca194c0e6e56122cac2e238053b9c8fd4c4af6f88e1f4adfafce719381
-
SSDEEP
24576:HyhP8luo3ui/TREl1jNbyKsbpougGpk2ei0dnIwwROSclqIUMo/wxC:Scuo35TMNSFoFGpk3HdIvUlqI8/w
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125
-
Size
1.4MB
-
MD5
540279474adae3b36deb77ab62dbfd44
-
SHA1
fb2f936ecc76d7949c101fb665f5d0ea8d4c04ff
-
SHA256
192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125
-
SHA512
45311689850dd286fdc30ff2bdca66d5bed753311974ce98150755ba6fe59a95806154abe685ef6ff2a45d87384e119df791cdbace9f6f56749f047bbab112ff
-
SSDEEP
24576:VyM5eKaQAhJoi25ceRIsZ7rGDEqDj2vVnZ3mdHC8a0rvlNmFcAkXqu4fLmd8o:w3m2y7SeKqPGzGvj3m1FNm+/XJm
Score7/10-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
-
-
Target
1f41b39d2b8ae20411682600943b3adf98567e247168192fb07ff103e71c9710
-
Size
909KB
-
MD5
89eb57f8336e4fa95663f64fd2ba5fdc
-
SHA1
30bc23cd4d7c49326423ffea9e9fd24a60214ca1
-
SHA256
1f41b39d2b8ae20411682600943b3adf98567e247168192fb07ff103e71c9710
-
SHA512
4c9811e15a74664c58f2f00efae5d607fcc576ae98de97e993eac663b90281e33b9634c88f1ce702cd04f5e24418b8c4117ed5fd0a2ab39debf3276de8d9f18c
-
SSDEEP
12288:SMrfy90DOZ2s5Ze9aC1cx+aA8q7PPCxXaFFn/sAONQzkuuvtICQPQGG:ByHo+8kCS4aubCY//kSkBmCQPQGG
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
2298c1857648a2d03e7260fec6bd85ba96ff550973a7c8df1efc3ff5ee212abb
-
Size
1.1MB
-
MD5
be180dec7e13fe1c2b75fde7469e9c23
-
SHA1
cda46df97e37b55146d41e4d5710f4bc511f8d58
-
SHA256
2298c1857648a2d03e7260fec6bd85ba96ff550973a7c8df1efc3ff5ee212abb
-
SHA512
dee4b6e2700fd94e814706e1721bd342fbe433671780d2bf1e59c3541d52a791aa0204a1900293a584d9fa2cdbf6dc214e742283a07bbc0e832f3605c2a35194
-
SSDEEP
24576:HyiVlna2DSBNRzXuTJ0RqbsvdLh+BOyvr7W3tvzAg+bGtK6Z:SWpENcVGqQvdgBOyvr7W3tvzAgTM
Score10/10-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
2ec7b7ec25de047e7eb1cd8f27cc8f7e111c7ac68d37c56e3938dee25147cbb3
-
Size
1.1MB
-
MD5
cf1fdcfe7b25b7ebfd12dcaa33226982
-
SHA1
2d143f32b6229858603a3392b2d464c30c950cc3
-
SHA256
2ec7b7ec25de047e7eb1cd8f27cc8f7e111c7ac68d37c56e3938dee25147cbb3
-
SHA512
853a78a93e86582ae51e0df7ff03e94d34c3ebdf2a9e8c9f6db8460e3d603db184bdd3ff1316ac771655025a307da938f7de64540937830f939a31d3070437eb
-
SSDEEP
24576:oyx0bVLDdTBOpukxKa031MMxngQJhcRPR6OEMrQniGG469pMyFYWXtEB1nXg:vSVLhgpvY3CdPMpnXGLMa9EX
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
2ff63e46365253076d5f6b65419f2c4110f1ceb32dbb57c43db28076bdd031cd
-
Size
1.5MB
-
MD5
aae7f482bfe7c21a481723c9a5899652
-
SHA1
318847e283e35ff787b107c9c983475695e4c610
-
SHA256
2ff63e46365253076d5f6b65419f2c4110f1ceb32dbb57c43db28076bdd031cd
-
SHA512
0cbdfb10b2688cc78211761c958e4ee59ade8d22d4d9b7d9ca631b356e16718af7cca3b6801469198635591692a6b3a82f8e037e736767ef5993b8b0cb12776a
-
SSDEEP
24576:pyLBNmVT0hDWpuvzN9YvucPnqKuzvPhSj/zRroKW:c0kDUurN9YvZP/uzvZCl1
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
3105fb3a2cc9654d1eac3354da0a10dfc792e32266a2a7a18fe16764e0b6bff2
-
Size
753KB
-
MD5
bb9c11cf568dbae8bd9f0e19d562235a
-
SHA1
08ef37baa4e2574ebed4d616dd2a8a8f2087c13f
-
SHA256
3105fb3a2cc9654d1eac3354da0a10dfc792e32266a2a7a18fe16764e0b6bff2
-
SHA512
20bb622e938e58ce20de3ba1db3359c420895ca631024f8792dc37c7840aafc67f0e26abac0cb6ff87fc27f255e87ad18d190a2306cd6bc657d16a898b7b2478
-
SSDEEP
12288:/Mr6y90RYqYRxyO2Yky7fmE1ynuR/mJKv6G9rr0Q2LN6izy8cFvlXp:dyI9YRxD7FSE0nuRqA6GwQ2R6JZFvlXp
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
5233b9c00ad7ff437dc70a2133e2e6251bcd63221cf9acbc7f1f8b00c9305c79
-
Size
895KB
-
MD5
0721b544aaf0359c0f310cbc448d3d65
-
SHA1
a4f8593939e868dbae1d8b1323b58124e3741a52
-
SHA256
5233b9c00ad7ff437dc70a2133e2e6251bcd63221cf9acbc7f1f8b00c9305c79
-
SHA512
10a70297d06cbcd968b6c3490c4ed12dcbe074038ac169bdca48e540814d7732b26d7d1861b360e0749cda83e82e9da90ba21ef53d0957b40737b8151abb51b4
-
SSDEEP
12288:nMrOy901KMmvVAZdBzcW7jPw+i4P5dOglj/jPd+69FzvPUQOIxLaJh5li+7GSAYc:dy5aZdBcW7jo+iY5jlnPdtzzcaG1c
-
Detect Mystic stealer payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
71ffbb500f4a8485edaa4aaeea3a716a9bbef886b7e16859b9f251f26a975963
-
Size
888KB
-
MD5
b9525c7d048b2fbda76cb69db016a079
-
SHA1
c2f87a4214b6c1394192bbe4a32a68c5b0f2c70b
-
SHA256
71ffbb500f4a8485edaa4aaeea3a716a9bbef886b7e16859b9f251f26a975963
-
SHA512
672398598b3a5a56727cf2a87c5c9bb28d5ac92a53ad5d456f669c327bbfa0dcf97d4dc1fce3ca5a3d1bba5af14e8d1efd3703034881bb2cbcb4d1253dc2510e
-
SSDEEP
24576:/yPXtYjSDrBNRzGDFv1JkyKbo+2VV+OI5+X9:KPXtY+5NwDVDrK8+22OI
Score10/10-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
88b74d8884f09632e668bea54668a44beb33e28e6d34636e7b8888fffc0f0f16
-
Size
646KB
-
MD5
0298257cd8a0b8b794370bac343a2112
-
SHA1
ef4bdd3a890c35d404fb860b0d303239ea4bba09
-
SHA256
88b74d8884f09632e668bea54668a44beb33e28e6d34636e7b8888fffc0f0f16
-
SHA512
0e045ee6a7e7d290b8221efe28bc9f434f92c9864ac5b0d8409e3e0e9a9ff702daaab9dfce9032eafabb680aa76a7ffe684f5bb93612c71f8ad1ec006d4b0afd
-
SSDEEP
12288:1Mrfy90I6MtVRZJn8mMJqSxdWmWdrBPqsJGm/qBIH7/rwIg3pEvUnF:eyRpZh8xhWdrtXkfeTL2pEqF
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
93a899efb0c194800223fca15c717009673f08a1a62d33fa602dfbcbc0b26454
-
Size
2.1MB
-
MD5
155d142955e7ff8f5534710b55af6954
-
SHA1
6ed09060a0d774842db8eba25e78e987009a7522
-
SHA256
93a899efb0c194800223fca15c717009673f08a1a62d33fa602dfbcbc0b26454
-
SHA512
e4cdbbdbbeab5d787ce36ca403d6427cf77c9464bea4b3d1ac9c89febac4d5c71f3a25ff9895b63a37e79026900629b4bc0af4953dac8cb7acdf8769c623af68
-
SSDEEP
49152:yVE8IIQ+bv+WEgM+KqugEd0Yo2v4ooB6hbc6vKX4E:jIQ16Ct0YoHEM
Score10/10-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
99144a8cae61109b46016ef756589ba3aa71222da541e3bda432b738f7469d06
-
Size
1.3MB
-
MD5
904fc61b1f44c5223a3c954b4cc2752d
-
SHA1
fff176e87a9300b428235e8c991fc4620002e646
-
SHA256
99144a8cae61109b46016ef756589ba3aa71222da541e3bda432b738f7469d06
-
SHA512
dc2eca434302c7988352395784452acf238aa57c440e789e8d507a695a10856aa36cbd2fdbd72854862b30350c8150c02e7e807ea6f2f76b18be46a376dd8749
-
SSDEEP
24576:0yzM9afmu263sRRmqwwLa5kbuI1T6CYDjJWjCCJIEFcOrrG4KRNy:DGHM8RRm55kiIgCEkj2EFcOfGX
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
9c6fad81c8c5b4e4185f597e8ecb47fd56f1147c7c2bc851eb0e36a99fa9b019
-
Size
1.1MB
-
MD5
58d2366a7da08273a6dbfac85d214bc8
-
SHA1
1b4da509e7014c5e346c95adb1d4bf23aa451a96
-
SHA256
9c6fad81c8c5b4e4185f597e8ecb47fd56f1147c7c2bc851eb0e36a99fa9b019
-
SHA512
ad5d49b9ed43893f1a01aee6b99e6b029506837d645265ca4f4d8a41bea35b0ba370a63a315bac9b1379a01d79d8b1e34d0ddc68132c774fd1fda38b53a55ee7
-
SSDEEP
24576:WywbLHyczegdbC1KHBVDqOgSaPQ77kLW/X6FBKnoqyEA:lwPH7qgFC1KHrDozI7Yo6FGyE
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
b0c7a00ab444001cd63f40a54db27100ea773e014721080a2b1279c33f37269d
-
Size
1.1MB
-
MD5
a36615107717ece0c2cfacb7d7c76907
-
SHA1
d8158782d730be783d9400f822dc38deeb87fcb3
-
SHA256
b0c7a00ab444001cd63f40a54db27100ea773e014721080a2b1279c33f37269d
-
SHA512
bcd47adbc0f9ec17d917954ee968ec1cb73280979e6edfec2980c95be1355407b65ce4bac92ac0df2401917d388776c53577eff8a0c85dc97d3bf69501547b0c
-
SSDEEP
24576:5yo/X7xqtcdAeeeRv8CntOFdrANsA/Veji5:s67xucdp82tOHpS8
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
cbf11756881901fd292b570bc3bb19b579c924b2d7f37bb2cf69de109a1da4f7
-
Size
398KB
-
MD5
6926a7c5164bb1bce0fb0fc33212c8b6
-
SHA1
cda8612e09133e99c3ff370a94c5cca211e0124b
-
SHA256
cbf11756881901fd292b570bc3bb19b579c924b2d7f37bb2cf69de109a1da4f7
-
SHA512
2202c376244694891ea3ee0498cb28078471ce17f274875baa4065cbb65568a3e62bc95b21e60893c0896f4878751ccee533bec6d58821e1f059c6e9dcde79e1
-
SSDEEP
6144:Kly+bnr+1p0yN90QEFEEnhxIdGdj8+bRLW0V7t5J56AVOL+tBckozYmN8T:LMrxy90DEEwm8KLW0pt5J5pV8+okcE
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
d722251ee6167c7e35bae3b84b679d483609f718be9b0d4851cca6d9ccfdee28
-
Size
494KB
-
MD5
cc17f7fd65eb5807c669a72e1ebce8e0
-
SHA1
ccb2679da3d2c11a41afa43b1478a0a1fecc7d28
-
SHA256
d722251ee6167c7e35bae3b84b679d483609f718be9b0d4851cca6d9ccfdee28
-
SHA512
2c46d80178f89757c5a5b4f793f03227f1d7d63eb0e56a5fbadf0f891828cfe3e59678ff8721336c2b12c65a35f52418fa72d52d500cc1d4ed6fa371e511f0ad
-
SSDEEP
12288:ZMrTy90wT1Wf73gyrtJ/xO6gn9t3bqS1HDUY7QYbhkc:KylT1Wfbgy//Sz3vHDUYk6kc
Score10/10-
Detect Mystic stealer payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2
-
Size
2.1MB
-
MD5
afe0c2cf35bf507d5ddf98521f598c8d
-
SHA1
f29f846fe109d71c7b06effb62c725400f92eba2
-
SHA256
daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2
-
SHA512
235876257c8fb6cd4c185f1b8c7ea5499b5da6abaed35efac4363d1f150440de8ac11f41f422e73ca5d191ab5b25df0f663b651bb1e8dbb068a9b1791c56d6ff
-
SSDEEP
49152:uxIYb9oY0LW8LicTGjz0neoPAkhqVP58xilKRLDzMRAIXCaMVgC:32qYZ1cKE4kCP5ArRvzwXEVgC
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
e2046b06e3810ca229ccfdfa24bc43ef690f3fb1808988596f1eec296ceadf39
-
Size
1.6MB
-
MD5
25eceff587aa9a2c07d4908c965120b0
-
SHA1
27e6af6ffccb125ed6baa1160d2bee315425bcc2
-
SHA256
e2046b06e3810ca229ccfdfa24bc43ef690f3fb1808988596f1eec296ceadf39
-
SHA512
2f85ec186fceb18c1f1776ccdf6c5f4e3cc9b3c78c8cebe348f403a5bf7aec9fcd9ce960e1c9b17ffd4eae4910b1acd8a216d67e48329dd31c42a5129c844f0e
-
SSDEEP
49152:AfAwDCP8V0NvKYbn1w1JudvDO6EM+w6ac:cD0NieLOFb
Score10/10-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1