General
-
Target
3b4c5828362b10aa3f5adabbb7df2fe252f38e07b0d9b5bbfabdc749916c26a8N
-
Size
1.6MB
-
Sample
241105-y3wwraxfmc
-
MD5
0d26b42076051a0694f57161698a2eb0
-
SHA1
30f49f32b6f0f71e1ffcfce95a78e4f58cc70fbc
-
SHA256
3b4c5828362b10aa3f5adabbb7df2fe252f38e07b0d9b5bbfabdc749916c26a8
-
SHA512
c5c9e874daf6d822f3328b028163e06f146adb0cf23a549756c9d3240c03c5980ad6dc70bfaf324da41cfc8be3cbd6dbcdc568c1cfb768f2debc1cff6e2d09ca
-
SSDEEP
24576:WyKuKgpUnfZqeIgj4+9m30htY+V5GPDt1WMMet8Lp3iyeOIpl96/k2jpVzB74X8I:lFpUffpzmWNVIt1RMymSl96s2jl4M
Static task
static1
Behavioral task
behavioral1
Sample
3b4c5828362b10aa3f5adabbb7df2fe252f38e07b0d9b5bbfabdc749916c26a8N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Targets
-
-
Target
3b4c5828362b10aa3f5adabbb7df2fe252f38e07b0d9b5bbfabdc749916c26a8N
-
Size
1.6MB
-
MD5
0d26b42076051a0694f57161698a2eb0
-
SHA1
30f49f32b6f0f71e1ffcfce95a78e4f58cc70fbc
-
SHA256
3b4c5828362b10aa3f5adabbb7df2fe252f38e07b0d9b5bbfabdc749916c26a8
-
SHA512
c5c9e874daf6d822f3328b028163e06f146adb0cf23a549756c9d3240c03c5980ad6dc70bfaf324da41cfc8be3cbd6dbcdc568c1cfb768f2debc1cff6e2d09ca
-
SSDEEP
24576:WyKuKgpUnfZqeIgj4+9m30htY+V5GPDt1WMMet8Lp3iyeOIpl96/k2jpVzB74X8I:lFpUffpzmWNVIt1RMymSl96s2jl4M
-
Detect Mystic stealer payload
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-