General
-
Target
728c49c705c2feb57d418020de79d64a70e728af8722694958b0e86a156152bf
-
Size
1017KB
-
Sample
241017-y2h89sxckr
-
MD5
0d9105c6c005d3c86ef90c753021550a
-
SHA1
16e32851b8c1e013e47e9c9527bcfeeeda468ba9
-
SHA256
728c49c705c2feb57d418020de79d64a70e728af8722694958b0e86a156152bf
-
SHA512
86c6ddbd5fd60fabc93d9d8ce0b22bda1136315e13e0feec13851a14a606057e99f4b1fa180de0264c3ea2457048bde7716556416388656385a6fbaf91606d4c
-
SSDEEP
24576:zyjZWkc+tgpL+IJ0I2SwBCRtVjnh/9+OEYWcXRGg:GMkeUI2PoRtVjnh/9+zYWc
Static task
static1
Behavioral task
behavioral1
Sample
728c49c705c2feb57d418020de79d64a70e728af8722694958b0e86a156152bf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Targets
-
-
Target
728c49c705c2feb57d418020de79d64a70e728af8722694958b0e86a156152bf
-
Size
1017KB
-
MD5
0d9105c6c005d3c86ef90c753021550a
-
SHA1
16e32851b8c1e013e47e9c9527bcfeeeda468ba9
-
SHA256
728c49c705c2feb57d418020de79d64a70e728af8722694958b0e86a156152bf
-
SHA512
86c6ddbd5fd60fabc93d9d8ce0b22bda1136315e13e0feec13851a14a606057e99f4b1fa180de0264c3ea2457048bde7716556416388656385a6fbaf91606d4c
-
SSDEEP
24576:zyjZWkc+tgpL+IJ0I2SwBCRtVjnh/9+OEYWcXRGg:GMkeUI2PoRtVjnh/9+zYWc
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-