General
-
Target
728d52c83aca0cb5de26056ec75dd870N.exe
-
Size
1.4MB
-
Sample
240824-zwgc6ayhrg
-
MD5
728d52c83aca0cb5de26056ec75dd870
-
SHA1
affc0728335f530fcac7f1b8dff3919cd1ec827a
-
SHA256
73b2c0167abf80d5aad9557dd5cc4d450d392f6a49980aa7346ec037f66ac075
-
SHA512
bf1201a598ab45ef14ef2b33d09d1fd4521d999ce179d0ae2965d4c1d7f55f61814eb4dc5d10ef47c5919c4ec0e51378264f7eda2a3c13b545449a2bea526e6a
-
SSDEEP
24576:wytD5/pwQvlVQnE2Bm2wCHv6fJ1+7IHp5WTyUDYaIxJuEn:37hwQNEvm2wovuJoIHp8Tya1Ixd
Static task
static1
Behavioral task
behavioral1
Sample
728d52c83aca0cb5de26056ec75dd870N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Targets
-
-
Target
728d52c83aca0cb5de26056ec75dd870N.exe
-
Size
1.4MB
-
MD5
728d52c83aca0cb5de26056ec75dd870
-
SHA1
affc0728335f530fcac7f1b8dff3919cd1ec827a
-
SHA256
73b2c0167abf80d5aad9557dd5cc4d450d392f6a49980aa7346ec037f66ac075
-
SHA512
bf1201a598ab45ef14ef2b33d09d1fd4521d999ce179d0ae2965d4c1d7f55f61814eb4dc5d10ef47c5919c4ec0e51378264f7eda2a3c13b545449a2bea526e6a
-
SSDEEP
24576:wytD5/pwQvlVQnE2Bm2wCHv6fJ1+7IHp5WTyUDYaIxJuEn:37hwQNEvm2wovuJoIHp8Tya1Ixd
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-