General
-
Target
NEAS.a468d20f44f8ce7976d9988f72aa2f8aec002ce9c60d1ca3540dc1b3194c4d98.exe
-
Size
511KB
-
Sample
231111-mjbwpaee23
-
MD5
d5c2e053a1e27d60ee24b1cb4aef5129
-
SHA1
b13a4ae46c177d2e467f92e7ea5966b668da7ca7
-
SHA256
a468d20f44f8ce7976d9988f72aa2f8aec002ce9c60d1ca3540dc1b3194c4d98
-
SHA512
90d5fd5e3a46a800368c6a61af21ed93025e193971c050187d7941a5ff0b1a98e9149cab12bf83024bf0cb888a0c61acfc26498983ee9e894638d5d3d704de34
-
SSDEEP
12288:1MrHy90q2/DWHvqP+wcWM6L+yY8TUs2Cux+4+wSRCFOnfGiULha:WyeSveeWn3YSz2CuEUSoM+ih
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a468d20f44f8ce7976d9988f72aa2f8aec002ce9c60d1ca3540dc1b3194c4d98.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.a468d20f44f8ce7976d9988f72aa2f8aec002ce9c60d1ca3540dc1b3194c4d98.exe
-
Size
511KB
-
MD5
d5c2e053a1e27d60ee24b1cb4aef5129
-
SHA1
b13a4ae46c177d2e467f92e7ea5966b668da7ca7
-
SHA256
a468d20f44f8ce7976d9988f72aa2f8aec002ce9c60d1ca3540dc1b3194c4d98
-
SHA512
90d5fd5e3a46a800368c6a61af21ed93025e193971c050187d7941a5ff0b1a98e9149cab12bf83024bf0cb888a0c61acfc26498983ee9e894638d5d3d704de34
-
SSDEEP
12288:1MrHy90q2/DWHvqP+wcWM6L+yY8TUs2Cux+4+wSRCFOnfGiULha:WyeSveeWn3YSz2CuEUSoM+ih
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-