General
-
Target
NEAS.94781d35282152aad8ab0f88cf76e5559aee6e058db31f8d83655c2710e9b8a1.exe
-
Size
511KB
-
Sample
231111-mx3xbsdh71
-
MD5
97c14a5981a24313692f1d91a0160e1b
-
SHA1
9335a440704dbe07ae8eb36c15732f62d55b0f41
-
SHA256
94781d35282152aad8ab0f88cf76e5559aee6e058db31f8d83655c2710e9b8a1
-
SHA512
0635c01105161bafeaee071a9575a14336efb51bc3cef7e57558a87f2c6e8acd7256f078c49e02df6cbaee6af6aab381f8290686098e6e286738c2f187c0e30b
-
SSDEEP
12288:9Mrry90JI0JP+SBDcXBY8TUs2Sul+4+wSROFNtg:CyUIMBcRYSz2SuYUSstg
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.94781d35282152aad8ab0f88cf76e5559aee6e058db31f8d83655c2710e9b8a1.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.94781d35282152aad8ab0f88cf76e5559aee6e058db31f8d83655c2710e9b8a1.exe
-
Size
511KB
-
MD5
97c14a5981a24313692f1d91a0160e1b
-
SHA1
9335a440704dbe07ae8eb36c15732f62d55b0f41
-
SHA256
94781d35282152aad8ab0f88cf76e5559aee6e058db31f8d83655c2710e9b8a1
-
SHA512
0635c01105161bafeaee071a9575a14336efb51bc3cef7e57558a87f2c6e8acd7256f078c49e02df6cbaee6af6aab381f8290686098e6e286738c2f187c0e30b
-
SSDEEP
12288:9Mrry90JI0JP+SBDcXBY8TUs2Sul+4+wSROFNtg:CyUIMBcRYSz2SuYUSstg
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-