General
-
Target
2a71c069ced4a4f8e33edffc52ee4c40N.exe
-
Size
593KB
-
Sample
240824-hxa44ayemc
-
MD5
2a71c069ced4a4f8e33edffc52ee4c40
-
SHA1
4d027de41adaf8e98178bd6001733f7d82c9753b
-
SHA256
65446b14c97c3a91857a5abdc890a7aeba14cb2c164399b37e01ac5f8ecbb53e
-
SHA512
c8bcfa3ad11692a8f20ba4a210f5ba9fbc82c47c250d93b1309ed70b6ab982387d33f3c44b4889d57f5c28c2b3a895cbc841cb9bc05c04582a66e8bdde4165d2
-
SSDEEP
12288:SMrsy90E6N6sy1YZLArW96Kwbtt8LAuUNl26fh:yyptNY+6vwbttZuUNl9
Static task
static1
Behavioral task
behavioral1
Sample
2a71c069ced4a4f8e33edffc52ee4c40N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Targets
-
-
Target
2a71c069ced4a4f8e33edffc52ee4c40N.exe
-
Size
593KB
-
MD5
2a71c069ced4a4f8e33edffc52ee4c40
-
SHA1
4d027de41adaf8e98178bd6001733f7d82c9753b
-
SHA256
65446b14c97c3a91857a5abdc890a7aeba14cb2c164399b37e01ac5f8ecbb53e
-
SHA512
c8bcfa3ad11692a8f20ba4a210f5ba9fbc82c47c250d93b1309ed70b6ab982387d33f3c44b4889d57f5c28c2b3a895cbc841cb9bc05c04582a66e8bdde4165d2
-
SSDEEP
12288:SMrsy90E6N6sy1YZLArW96Kwbtt8LAuUNl26fh:yyptNY+6vwbttZuUNl9
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-