General
-
Target
4f09e5659794eaea5955bcb72eafe75510d97aa047565312f4c4d37826f3d93aN
-
Size
678KB
-
Sample
241102-xzn63asgmf
-
MD5
809e72b60c534a9e32aca15039d5c560
-
SHA1
914934908c05809566f284dd977813d667cb4590
-
SHA256
4f09e5659794eaea5955bcb72eafe75510d97aa047565312f4c4d37826f3d93a
-
SHA512
e37d266520692ec449859ef3eb67519a5fbb8ecc5a7361b2ce375f2a7fa7600343296edb16076f8b8094fd188cfe9a031b821f849d40a4178789e830dc686885
-
SSDEEP
12288:LMrQy909nEKRresal5ngE2BeVHs3lv0wOD1zruOR+jeVh2hOaBe9IU5Wh9YVl:HyUnEKR96xn2f3tx+1DIK72hbB+vr
Static task
static1
Behavioral task
behavioral1
Sample
4f09e5659794eaea5955bcb72eafe75510d97aa047565312f4c4d37826f3d93aN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Targets
-
-
Target
4f09e5659794eaea5955bcb72eafe75510d97aa047565312f4c4d37826f3d93aN
-
Size
678KB
-
MD5
809e72b60c534a9e32aca15039d5c560
-
SHA1
914934908c05809566f284dd977813d667cb4590
-
SHA256
4f09e5659794eaea5955bcb72eafe75510d97aa047565312f4c4d37826f3d93a
-
SHA512
e37d266520692ec449859ef3eb67519a5fbb8ecc5a7361b2ce375f2a7fa7600343296edb16076f8b8094fd188cfe9a031b821f849d40a4178789e830dc686885
-
SSDEEP
12288:LMrQy909nEKRresal5ngE2BeVHs3lv0wOD1zruOR+jeVh2hOaBe9IU5Wh9YVl:HyUnEKR96xn2f3tx+1DIK72hbB+vr
-
Detect Mystic stealer payload
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-