General
-
Target
ebed7638ed1683139872218c9acfcf40e689f609f9d79dfdd60af3faa53897a6N
-
Size
1.4MB
-
Sample
241104-2myxysyfmg
-
MD5
d33b7d13c5fb379d2a3817ecaa8bef20
-
SHA1
cc4d43a964b2cd8b196791936a38eb39195fb5b5
-
SHA256
ebed7638ed1683139872218c9acfcf40e689f609f9d79dfdd60af3faa53897a6
-
SHA512
7b8513247feb0adecacd6210024141cac7a12d382cdaa93ab1e778c29f9f4904f11d0a86761dbd621053decc6feb0939f8cbaeffefa8621f2a2b7831c9eb55bb
-
SSDEEP
24576:3yOvZtvSMg4248k6TPs8GcVE0ZketvxXnwbrtd5CYXaiFUVfCT0lfTI:CMtvSMg4L/6TPsh0me3gbr/kYqrVq4
Static task
static1
Behavioral task
behavioral1
Sample
ebed7638ed1683139872218c9acfcf40e689f609f9d79dfdd60af3faa53897a6N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Targets
-
-
Target
ebed7638ed1683139872218c9acfcf40e689f609f9d79dfdd60af3faa53897a6N
-
Size
1.4MB
-
MD5
d33b7d13c5fb379d2a3817ecaa8bef20
-
SHA1
cc4d43a964b2cd8b196791936a38eb39195fb5b5
-
SHA256
ebed7638ed1683139872218c9acfcf40e689f609f9d79dfdd60af3faa53897a6
-
SHA512
7b8513247feb0adecacd6210024141cac7a12d382cdaa93ab1e778c29f9f4904f11d0a86761dbd621053decc6feb0939f8cbaeffefa8621f2a2b7831c9eb55bb
-
SSDEEP
24576:3yOvZtvSMg4248k6TPs8GcVE0ZketvxXnwbrtd5CYXaiFUVfCT0lfTI:CMtvSMg4L/6TPsh0me3gbr/kYqrVq4
-
Detect Mystic stealer payload
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-