General
-
Target
477922325633bfc1def1ea2d953349f4e417896d7f49e067fe6bc5de05ab7698
-
Size
561KB
-
Sample
250221-3ef8lssngv
-
MD5
70dc58001691e2262a8061d57893789a
-
SHA1
532f97b6a9090396f778f3ce3248f7585066a098
-
SHA256
477922325633bfc1def1ea2d953349f4e417896d7f49e067fe6bc5de05ab7698
-
SHA512
d7ddadbca5c7ad7db627e559c5f952586c28e9873b62e7706d34b6e1ede2ebace4bb1aaec9fabb756fefcff4396060d73586132510ed16584cd8eaac473e8240
-
SSDEEP
12288:VMrcy90awy7S8NxqrvtEmiLcXi4iE+01Ib/nSZ:Vybwy7hUv5kcXv3+e1Z
Static task
static1
Behavioral task
behavioral1
Sample
477922325633bfc1def1ea2d953349f4e417896d7f49e067fe6bc5de05ab7698.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Targets
-
-
Target
477922325633bfc1def1ea2d953349f4e417896d7f49e067fe6bc5de05ab7698
-
Size
561KB
-
MD5
70dc58001691e2262a8061d57893789a
-
SHA1
532f97b6a9090396f778f3ce3248f7585066a098
-
SHA256
477922325633bfc1def1ea2d953349f4e417896d7f49e067fe6bc5de05ab7698
-
SHA512
d7ddadbca5c7ad7db627e559c5f952586c28e9873b62e7706d34b6e1ede2ebace4bb1aaec9fabb756fefcff4396060d73586132510ed16584cd8eaac473e8240
-
SSDEEP
12288:VMrcy90awy7S8NxqrvtEmiLcXi4iE+01Ib/nSZ:Vybwy7hUv5kcXv3+e1Z
-
Detect Mystic stealer payload
-
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-