General
-
Target
a6ff6a7ab6362d9ccec1a6426ea922e6a019db52566978b4abbe072ead27de1b
-
Size
649KB
-
Sample
241110-bsm5jawfjm
-
MD5
f1a296f2fcae06b2454d4d2faeb4ef73
-
SHA1
4ca48f90f2d1cc5cedb51ee55bff2bd91f11c2e8
-
SHA256
a6ff6a7ab6362d9ccec1a6426ea922e6a019db52566978b4abbe072ead27de1b
-
SHA512
acc2b42c58f1209f4e386202678f7b3f206543f0ab972b22e2684d547c88c82589aff145ff83477ad91f692da30832f305d816ad6306d5543ea31cd88be5a084
-
SSDEEP
12288:fMr5y90jtT1OxsuP2MDT2YrmGdon11pI97Y52W/8+9RGgoVoz1r7FAgD:iymZ6BT22LmnHpI97OM+9QXQlFfD
Static task
static1
Behavioral task
behavioral1
Sample
a6ff6a7ab6362d9ccec1a6426ea922e6a019db52566978b4abbe072ead27de1b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Targets
-
-
Target
a6ff6a7ab6362d9ccec1a6426ea922e6a019db52566978b4abbe072ead27de1b
-
Size
649KB
-
MD5
f1a296f2fcae06b2454d4d2faeb4ef73
-
SHA1
4ca48f90f2d1cc5cedb51ee55bff2bd91f11c2e8
-
SHA256
a6ff6a7ab6362d9ccec1a6426ea922e6a019db52566978b4abbe072ead27de1b
-
SHA512
acc2b42c58f1209f4e386202678f7b3f206543f0ab972b22e2684d547c88c82589aff145ff83477ad91f692da30832f305d816ad6306d5543ea31cd88be5a084
-
SSDEEP
12288:fMr5y90jtT1OxsuP2MDT2YrmGdon11pI97Y52W/8+9RGgoVoz1r7FAgD:iymZ6BT22LmnHpI97OM+9QXQlFfD
-
Detect Mystic stealer payload
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-