General
-
Target
bff0d8546cd2ef6abe76d306a8303158ace15877837702bfa7fcb8c83885ca88
-
Size
877KB
-
Sample
231111-qw8b7sfh61
-
MD5
e5100d42497933bde7f323ade83f7e28
-
SHA1
3e267cf7b6a5cd0af212f51538ae52cb1dee6eab
-
SHA256
bff0d8546cd2ef6abe76d306a8303158ace15877837702bfa7fcb8c83885ca88
-
SHA512
4ba962b48d5a93518f2517ff466ac4f90c60da6c10f3d582658d452bb4ac7892e70ad2f26bbc814d75ea7eda365f7cfe858ff58ffb784373e8fc7b456f246cea
-
SSDEEP
24576:TymQkcMsaeUIsMCtGiPYD78Yjtel8IoWvMN6:mE1ez3iGdv9jtelu
Static task
static1
Behavioral task
behavioral1
Sample
bff0d8546cd2ef6abe76d306a8303158ace15877837702bfa7fcb8c83885ca88.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
bff0d8546cd2ef6abe76d306a8303158ace15877837702bfa7fcb8c83885ca88
-
Size
877KB
-
MD5
e5100d42497933bde7f323ade83f7e28
-
SHA1
3e267cf7b6a5cd0af212f51538ae52cb1dee6eab
-
SHA256
bff0d8546cd2ef6abe76d306a8303158ace15877837702bfa7fcb8c83885ca88
-
SHA512
4ba962b48d5a93518f2517ff466ac4f90c60da6c10f3d582658d452bb4ac7892e70ad2f26bbc814d75ea7eda365f7cfe858ff58ffb784373e8fc7b456f246cea
-
SSDEEP
24576:TymQkcMsaeUIsMCtGiPYD78Yjtel8IoWvMN6:mE1ez3iGdv9jtelu
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-