General
-
Target
86a4936c8ee34875d49ce4a923fe7b60N.exe
-
Size
1.0MB
-
Sample
240831-brjqqaxejg
-
MD5
86a4936c8ee34875d49ce4a923fe7b60
-
SHA1
fbb5d1506efadc552b73e5b91a203586ef9aed24
-
SHA256
665c2dfbc8db51a7b74bee189fa0e4a2ce4dba6e15900cb5e69dae361321c0e8
-
SHA512
826791adc594cc3dd720e368cf68131f91a970ef220cdb58c72bcc5fe54416c2df3930c3ee8c0db393529506577263fa0ec7322708a4922b56c74812ef8aac51
-
SSDEEP
24576:cyjqV8n8PLWkBhhNuf0L8dI3AAy4Lt2iv+kBhsaCVQu1cqC:LjJ8zWkif0LJ3y4k6BhsBVQ5q
Static task
static1
Behavioral task
behavioral1
Sample
86a4936c8ee34875d49ce4a923fe7b60N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Targets
-
-
Target
86a4936c8ee34875d49ce4a923fe7b60N.exe
-
Size
1.0MB
-
MD5
86a4936c8ee34875d49ce4a923fe7b60
-
SHA1
fbb5d1506efadc552b73e5b91a203586ef9aed24
-
SHA256
665c2dfbc8db51a7b74bee189fa0e4a2ce4dba6e15900cb5e69dae361321c0e8
-
SHA512
826791adc594cc3dd720e368cf68131f91a970ef220cdb58c72bcc5fe54416c2df3930c3ee8c0db393529506577263fa0ec7322708a4922b56c74812ef8aac51
-
SSDEEP
24576:cyjqV8n8PLWkBhhNuf0L8dI3AAy4Lt2iv+kBhsaCVQu1cqC:LjJ8zWkif0LJ3y4k6BhsBVQ5q
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-