General
-
Target
NEAS.35519396c3f6f09fb10973923cabe3a8a28b9339cc846b72bb85f36ce8852b3a.exe
-
Size
511KB
-
Sample
231111-l6d4wseb54
-
MD5
db1259b1ce3a588a3b3ac6f44ae3bb2e
-
SHA1
f02b3b97409ee639e85018d13eba138ab8fedefb
-
SHA256
35519396c3f6f09fb10973923cabe3a8a28b9339cc846b72bb85f36ce8852b3a
-
SHA512
7dcaceb476a5fe517ed3c111147d581eba01f9057d4cb31ef7f5b904cf2ce6d8a53c0e02aa5272e23f9df4bf5a7b0f2a71fdc03a84c7b9c05fb442214180fe4f
-
SSDEEP
12288:SMr9y90Tc0i/V90LxwpW8Y8TUs2MuX+4+wSR9FCV9f8XOT:Xy0Nl8YSz2MuuUS3af9
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.35519396c3f6f09fb10973923cabe3a8a28b9339cc846b72bb85f36ce8852b3a.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.35519396c3f6f09fb10973923cabe3a8a28b9339cc846b72bb85f36ce8852b3a.exe
-
Size
511KB
-
MD5
db1259b1ce3a588a3b3ac6f44ae3bb2e
-
SHA1
f02b3b97409ee639e85018d13eba138ab8fedefb
-
SHA256
35519396c3f6f09fb10973923cabe3a8a28b9339cc846b72bb85f36ce8852b3a
-
SHA512
7dcaceb476a5fe517ed3c111147d581eba01f9057d4cb31ef7f5b904cf2ce6d8a53c0e02aa5272e23f9df4bf5a7b0f2a71fdc03a84c7b9c05fb442214180fe4f
-
SSDEEP
12288:SMr9y90Tc0i/V90LxwpW8Y8TUs2MuX+4+wSR9FCV9f8XOT:Xy0Nl8YSz2MuuUS3af9
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-