General
-
Target
3686e746ce7172063ac3b749b5f98a3e86e422dca03472a5feba9871dd65bb5d
-
Size
548KB
-
Sample
241028-1q6ljawlbv
-
MD5
df3a1a0c571e06dbf9e9f228872b9825
-
SHA1
b3915508ea8ef4392bb50317a6686e26a47b7f21
-
SHA256
3686e746ce7172063ac3b749b5f98a3e86e422dca03472a5feba9871dd65bb5d
-
SHA512
0582b9d2c0ba09dee5357d4ddb7d15ee7d2178a1165a4168a6a874703e8c5b8f521450d66eb66b74fe2a8f5e0bf25007cfc65f9d6559c65bcf07d940db0e5df4
-
SSDEEP
12288:HMr9y90qXlWAXlb9ssmU4aAJBHrKYk7czBg+Nc:+yHWcssZ4aAJBLKX7cNg+Nc
Static task
static1
Behavioral task
behavioral1
Sample
3686e746ce7172063ac3b749b5f98a3e86e422dca03472a5feba9871dd65bb5d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Targets
-
-
Target
3686e746ce7172063ac3b749b5f98a3e86e422dca03472a5feba9871dd65bb5d
-
Size
548KB
-
MD5
df3a1a0c571e06dbf9e9f228872b9825
-
SHA1
b3915508ea8ef4392bb50317a6686e26a47b7f21
-
SHA256
3686e746ce7172063ac3b749b5f98a3e86e422dca03472a5feba9871dd65bb5d
-
SHA512
0582b9d2c0ba09dee5357d4ddb7d15ee7d2178a1165a4168a6a874703e8c5b8f521450d66eb66b74fe2a8f5e0bf25007cfc65f9d6559c65bcf07d940db0e5df4
-
SSDEEP
12288:HMr9y90qXlWAXlb9ssmU4aAJBHrKYk7czBg+Nc:+yHWcssZ4aAJBLKX7cNg+Nc
-
Detect Mystic stealer payload
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-