General
-
Target
341f8a069dcbf713a42936d787d8a0d1.exe
-
Size
1.3MB
-
Sample
231111-mq39hsef36
-
MD5
341f8a069dcbf713a42936d787d8a0d1
-
SHA1
93cf489987decb1d262cf3ee38f9eef062f566da
-
SHA256
6f5029869984f774932ee5eec105cec8daeeb1f5c6411a8089c8dcb0e9ab7747
-
SHA512
e31c408c56dc5cfebb22fbc8ce099aad39443b24db662512aa78592559340cd135b41fb0d877e9afd9894e891cfacf06677d67205e3ebbf02b7fc2b58f71b8cb
-
SSDEEP
24576:oywcSW2S0aebIs6CeGlWUDBsA0YkT4srgED/hdyFXaE5W:vwcSUeUzFGZlIBem/hdydaE
Static task
static1
Behavioral task
behavioral1
Sample
341f8a069dcbf713a42936d787d8a0d1.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
341f8a069dcbf713a42936d787d8a0d1.exe
-
Size
1.3MB
-
MD5
341f8a069dcbf713a42936d787d8a0d1
-
SHA1
93cf489987decb1d262cf3ee38f9eef062f566da
-
SHA256
6f5029869984f774932ee5eec105cec8daeeb1f5c6411a8089c8dcb0e9ab7747
-
SHA512
e31c408c56dc5cfebb22fbc8ce099aad39443b24db662512aa78592559340cd135b41fb0d877e9afd9894e891cfacf06677d67205e3ebbf02b7fc2b58f71b8cb
-
SSDEEP
24576:oywcSW2S0aebIs6CeGlWUDBsA0YkT4srgED/hdyFXaE5W:vwcSUeUzFGZlIBem/hdydaE
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-