General
-
Target
8f255c2408bd55e9f005d5d2d1bb418945bb7f5b025c01a390d5e964a905f2fe
-
Size
1.3MB
-
Sample
231111-2ac5qabh2v
-
MD5
6b82f1d63c55c4ca2df51be99db74c71
-
SHA1
f6074eb0a28acd525f53563c30b4089701848dc1
-
SHA256
8f255c2408bd55e9f005d5d2d1bb418945bb7f5b025c01a390d5e964a905f2fe
-
SHA512
982a1a871c77763905120d285a711d7e997947f8e33cf106030e7705cb102e958cd515a02a56026b65065c9223c62cbeac55822f98433926a156352909eefb73
-
SSDEEP
24576:syrAmNq/zaezIsUCEGRmYDLMIOuGbExM7LipZKaHNU5y6VaJgI:brbecD7GvMjInKQ6V9
Static task
static1
Behavioral task
behavioral1
Sample
8f255c2408bd55e9f005d5d2d1bb418945bb7f5b025c01a390d5e964a905f2fe.exe
Resource
win10-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
8f255c2408bd55e9f005d5d2d1bb418945bb7f5b025c01a390d5e964a905f2fe
-
Size
1.3MB
-
MD5
6b82f1d63c55c4ca2df51be99db74c71
-
SHA1
f6074eb0a28acd525f53563c30b4089701848dc1
-
SHA256
8f255c2408bd55e9f005d5d2d1bb418945bb7f5b025c01a390d5e964a905f2fe
-
SHA512
982a1a871c77763905120d285a711d7e997947f8e33cf106030e7705cb102e958cd515a02a56026b65065c9223c62cbeac55822f98433926a156352909eefb73
-
SSDEEP
24576:syrAmNq/zaezIsUCEGRmYDLMIOuGbExM7LipZKaHNU5y6VaJgI:brbecD7GvMjInKQ6V9
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-