General
-
Target
98568e60dd6aaa4e3bbfbf94d2b5aab06949a6ed4abae6a532d96b142408ea61
-
Size
973KB
-
Sample
240817-zpdcxsygll
-
MD5
7e4bda4dbcb436db5a4e7ec5d047c5ed
-
SHA1
3a9d516ab0b9e28e77942fb30764bfd2601f4832
-
SHA256
e19f54b03f54fd3d106f72335cf721bc5f692c823069bd689ca6a6334ed31d92
-
SHA512
caad688cc473e7b3d906010e9600fbb15e95f198e98aee4cb10ede94b75993126602ae8bc4d67e4db8294fcd62e6c932832adcdcc7e5c41b4732ead06001133e
-
SSDEEP
24576:9P1WVy5Me/0rQixnl6TtDJ5h4uNCo7WtWH4S/O8Oc:X51c8S6n5h4W774qv
Static task
static1
Behavioral task
behavioral1
Sample
98568e60dd6aaa4e3bbfbf94d2b5aab06949a6ed4abae6a532d96b142408ea61.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Targets
-
-
Target
98568e60dd6aaa4e3bbfbf94d2b5aab06949a6ed4abae6a532d96b142408ea61
-
Size
1017KB
-
MD5
9ff109638c5a001829bdb07be04ad4a9
-
SHA1
c51ce1cbf7a0fac879e50965467dce23fbdcc28c
-
SHA256
98568e60dd6aaa4e3bbfbf94d2b5aab06949a6ed4abae6a532d96b142408ea61
-
SHA512
830a960e75269d0fbaaecee7173a6b1ea154e4c461e25deef9bf9670ab823b694f39b6b8637d5181fecd0ac58db992586fb39d9ff6a65c19af1a969cc0bcad50
-
SSDEEP
12288:kMrZy90VVFI/tCVY0IcQb3GwzFkp/9D0Fdv5S4eGc4K6jinwaG7C7FK7OW3uwT/o:lykef0rQiXplOrLV4WfODwUZ+j/VE
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-