General
-
Target
c6e3938ab0a4cae5b4a7c259a22139e980235071a9a94e36c18b7a1897a2912c
-
Size
1.3MB
-
Sample
231112-aj15cscg88
-
MD5
1cfc090bde8667f9eec30cfe90ba3101
-
SHA1
2741ea598bdd6c5c83d43389d0b04e767db7c860
-
SHA256
c6e3938ab0a4cae5b4a7c259a22139e980235071a9a94e36c18b7a1897a2912c
-
SHA512
a98871ec5b1a8d652b38317cb40af4331aaa008a34d4d8fd187cb8c226c2dff4b40c79af8cb19feff629eb62d45c086910c1789b67b0b02c5fde5e36c52dfc7f
-
SSDEEP
24576:xyy0wcZwae/IsWCwGEQBDkrMsBQRTo3o8jiqv6HmLnujP:kykZJeQzvGjYnQR+x6GLw
Static task
static1
Behavioral task
behavioral1
Sample
c6e3938ab0a4cae5b4a7c259a22139e980235071a9a94e36c18b7a1897a2912c.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
c6e3938ab0a4cae5b4a7c259a22139e980235071a9a94e36c18b7a1897a2912c
-
Size
1.3MB
-
MD5
1cfc090bde8667f9eec30cfe90ba3101
-
SHA1
2741ea598bdd6c5c83d43389d0b04e767db7c860
-
SHA256
c6e3938ab0a4cae5b4a7c259a22139e980235071a9a94e36c18b7a1897a2912c
-
SHA512
a98871ec5b1a8d652b38317cb40af4331aaa008a34d4d8fd187cb8c226c2dff4b40c79af8cb19feff629eb62d45c086910c1789b67b0b02c5fde5e36c52dfc7f
-
SSDEEP
24576:xyy0wcZwae/IsWCwGEQBDkrMsBQRTo3o8jiqv6HmLnujP:kykZJeQzvGjYnQR+x6GLw
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-