General
-
Target
5bc277ca07162de67db08c5ae9b94d3fd1f8e6dc90faae9b9ebd5b0b8c5695c5N
-
Size
326KB
-
Sample
241029-manh5avaqd
-
MD5
ab21eebc42492cd4e6d6435b93d5ea90
-
SHA1
743f891fd0bde5093097a4f5fb3895d50cd1736f
-
SHA256
5bc277ca07162de67db08c5ae9b94d3fd1f8e6dc90faae9b9ebd5b0b8c5695c5
-
SHA512
865c33a52df3a9f52f1bc25aff3cd5dc93e78bc255024472247975fd34e80940385c3fa0d273d15ca9b4e7d87b50b34fc31728c28b1cfbdf773df56239dacde3
-
SSDEEP
6144:Kly+bnr+xp0yN90QETcX6VOwPBIAy+hy8vlvZgRkajW19y0a/Y:/MrJy90Jc+OnA4q2i1baY
Static task
static1
Behavioral task
behavioral1
Sample
5bc277ca07162de67db08c5ae9b94d3fd1f8e6dc90faae9b9ebd5b0b8c5695c5N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
lutyr
77.91.124.55:19071
Targets
-
-
Target
5bc277ca07162de67db08c5ae9b94d3fd1f8e6dc90faae9b9ebd5b0b8c5695c5N
-
Size
326KB
-
MD5
ab21eebc42492cd4e6d6435b93d5ea90
-
SHA1
743f891fd0bde5093097a4f5fb3895d50cd1736f
-
SHA256
5bc277ca07162de67db08c5ae9b94d3fd1f8e6dc90faae9b9ebd5b0b8c5695c5
-
SHA512
865c33a52df3a9f52f1bc25aff3cd5dc93e78bc255024472247975fd34e80940385c3fa0d273d15ca9b4e7d87b50b34fc31728c28b1cfbdf773df56239dacde3
-
SSDEEP
6144:Kly+bnr+xp0yN90QETcX6VOwPBIAy+hy8vlvZgRkajW19y0a/Y:/MrJy90Jc+OnA4q2i1baY
-
Detect Mystic stealer payload
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-