General
-
Target
dea9537052946aaf1e74a81a67689f6c8e1e9d42ecbddbd097be8dd9517c18a1
-
Size
1.3MB
-
Sample
231112-2s199sdc4v
-
MD5
078dcca9cde08d4e1f2d4571adaad38b
-
SHA1
86835d52788b6a712a7a67397ae16a19b13704c0
-
SHA256
dea9537052946aaf1e74a81a67689f6c8e1e9d42ecbddbd097be8dd9517c18a1
-
SHA512
6c77c95a64ae1998923872355672de46638fcf1e5763edc1aebd81a4dfbad83076c7252208e2f447297fdd82bb0a547fd222c72db60110bef4a8b9b7ae522c0c
-
SSDEEP
24576:QyEN6y0zss5LaeGIs0CIGjFGDXpV2fg7wt8EjXDTVJju38gchQc:Xwn0t5Oe1rDGwlV2I728Ejtrgc
Static task
static1
Behavioral task
behavioral1
Sample
dea9537052946aaf1e74a81a67689f6c8e1e9d42ecbddbd097be8dd9517c18a1.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
dea9537052946aaf1e74a81a67689f6c8e1e9d42ecbddbd097be8dd9517c18a1
-
Size
1.3MB
-
MD5
078dcca9cde08d4e1f2d4571adaad38b
-
SHA1
86835d52788b6a712a7a67397ae16a19b13704c0
-
SHA256
dea9537052946aaf1e74a81a67689f6c8e1e9d42ecbddbd097be8dd9517c18a1
-
SHA512
6c77c95a64ae1998923872355672de46638fcf1e5763edc1aebd81a4dfbad83076c7252208e2f447297fdd82bb0a547fd222c72db60110bef4a8b9b7ae522c0c
-
SSDEEP
24576:QyEN6y0zss5LaeGIs0CIGjFGDXpV2fg7wt8EjXDTVJju38gchQc:Xwn0t5Oe1rDGwlV2I728Ejtrgc
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-