General
-
Target
909182a4ae4d0aff248ce1cc77ea5004.bin
-
Size
875KB
-
Sample
231112-c4rsjadb77
-
MD5
0af4df539e01cabf184abef43940d935
-
SHA1
6e7b3141f9628f1b91da72010525839c5768f4a8
-
SHA256
7b6189cc4818488f353f3eacdfa649c2f42656a6697c2a6268dd4c3dc79e466d
-
SHA512
90d99274b536b75efc1a007757d028f3703a7cb0e93b192a8e357e6d78bff267a4b72f285d38c8275ea747cc2c52cbbcd16ba7db6fcc9ce6940728e74c438a71
-
SSDEEP
24576:Jnq8LlQmr4i3JErvr81hAnw8IveUdLCU9g:Jq8uDKJErvo1+wZGKLP9g
Static task
static1
Behavioral task
behavioral1
Sample
f414d222ed8a741f09e628ea177621bb850e440941fa4f6d54e81f3211d1c604.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
f414d222ed8a741f09e628ea177621bb850e440941fa4f6d54e81f3211d1c604.exe
-
Size
919KB
-
MD5
909182a4ae4d0aff248ce1cc77ea5004
-
SHA1
3b2aa06940d541492fd19893adfcc7628d512cbd
-
SHA256
f414d222ed8a741f09e628ea177621bb850e440941fa4f6d54e81f3211d1c604
-
SHA512
e6ef3a49f2a832a7817c1d074d83508e38f964f26a70f11775fa1a2ee2e943ca4ea6d52393b472bc1a96294672fbf02fc5ec3547092667bca4f7c296bfddc2e5
-
SSDEEP
24576:GyphPYaeuIsuC/GRLYDb/21Ka1rSRrSwY:VpetZEGK/u1zS
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-