General
-
Target
d7f22b7eebe108f78403cd95501e598191ac75d3ec959f746efec4767e6c2c46
-
Size
956KB
-
Sample
240531-d7z4radh4z
-
MD5
57b7364686bb815599ac2e803a7186f5
-
SHA1
0931a586aa2b6e1772006409ecc94d9b46942b77
-
SHA256
d7f22b7eebe108f78403cd95501e598191ac75d3ec959f746efec4767e6c2c46
-
SHA512
1bc1d2504c1b0dd3334633b7934477f2fef7d320ac3733b48347cb0715e32ea080332f87ec1aa82ecb7abba02404a43412eab78804e8d2abc64df04c73d69f46
-
SSDEEP
12288:fMr1y90ELP7G5gWanByhVHtWDCwQ2QkAlJjyAM6c2d4XuNTvaU2NC/tItquzQSGO:Gy3zgWByhzWDw2QkiJndhQC/tri
Static task
static1
Behavioral task
behavioral1
Sample
d7f22b7eebe108f78403cd95501e598191ac75d3ec959f746efec4767e6c2c46.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
tuxiu
77.91.124.82:19071
-
auth_value
29610cdad07e7187eec70685a04b89fe
Targets
-
-
Target
d7f22b7eebe108f78403cd95501e598191ac75d3ec959f746efec4767e6c2c46
-
Size
956KB
-
MD5
57b7364686bb815599ac2e803a7186f5
-
SHA1
0931a586aa2b6e1772006409ecc94d9b46942b77
-
SHA256
d7f22b7eebe108f78403cd95501e598191ac75d3ec959f746efec4767e6c2c46
-
SHA512
1bc1d2504c1b0dd3334633b7934477f2fef7d320ac3733b48347cb0715e32ea080332f87ec1aa82ecb7abba02404a43412eab78804e8d2abc64df04c73d69f46
-
SSDEEP
12288:fMr1y90ELP7G5gWanByhVHtWDCwQ2QkAlJjyAM6c2d4XuNTvaU2NC/tItquzQSGO:Gy3zgWByhzWDw2QkiJndhQC/tri
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers
-
Detects executables packed with ConfuserEx Mod
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-