General
-
Target
555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1
-
Size
522KB
-
Sample
241026-zwjhhswqfk
-
MD5
445f7f64dbdf136608359b3ac09cc3f2
-
SHA1
a6c747bd747eb775cfb07376e21283e2c44b9c8d
-
SHA256
555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1
-
SHA512
906c8127789f8e5afc6059b9ede36c037a021d5ebfdf23ba0724ca823278e86d688ff1e4a374758dd35b2bf1519397407d8537c1598f3fb927bcee9d61a83e3d
-
SSDEEP
6144:KQy+bnr+jp0yN90QEFhJRfOCrz1ensG/ZmlTjDzLc24vwpgHho8llvrgliPAtt6/:0Mrjy90PhxRTj424vw9cklV4sNLFQx9
Static task
static1
Behavioral task
behavioral1
Sample
555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Targets
-
-
Target
555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1
-
Size
522KB
-
MD5
445f7f64dbdf136608359b3ac09cc3f2
-
SHA1
a6c747bd747eb775cfb07376e21283e2c44b9c8d
-
SHA256
555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1
-
SHA512
906c8127789f8e5afc6059b9ede36c037a021d5ebfdf23ba0724ca823278e86d688ff1e4a374758dd35b2bf1519397407d8537c1598f3fb927bcee9d61a83e3d
-
SSDEEP
6144:KQy+bnr+jp0yN90QEFhJRfOCrz1ensG/ZmlTjDzLc24vwpgHho8llvrgliPAtt6/:0Mrjy90PhxRTj424vw9cklV4sNLFQx9
-
Detect Mystic stealer payload
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-