General
-
Target
8333f53248f207b4fa7abaa1f900a261.bin
-
Size
873KB
-
Sample
231112-cybt5ace3y
-
MD5
777a036fe9cbab32f16267e4e5f870ee
-
SHA1
0935d5daeda2ebec192516a527a1168df0a0940c
-
SHA256
4817b7f3e881a5627747a4038cb5d7e9da8f171a502b23fe188ccfb619a8ff46
-
SHA512
ecce5f732132fcda645ac08df1f5d7a51349b5ca9895b5f2925b5110b7458ce4c21698691883262e6a30b7d79c4e3f039da8031aa982d191b8f34a61e269edfb
-
SSDEEP
24576:yAY21+cDJh/t5In0xzFhhc6s+SPgWxjX/2GwxQj0P:jwcD7PphWz+aNvRY
Static task
static1
Behavioral task
behavioral1
Sample
1f351c6e17a289120d35fe4a1f0bbcdabd289d91fb249162fae7c50f3e3f4618.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
1f351c6e17a289120d35fe4a1f0bbcdabd289d91fb249162fae7c50f3e3f4618.exe
-
Size
916KB
-
MD5
8333f53248f207b4fa7abaa1f900a261
-
SHA1
b36b42f971c7069fca5383aa8eeeaa8e99f6a6f1
-
SHA256
1f351c6e17a289120d35fe4a1f0bbcdabd289d91fb249162fae7c50f3e3f4618
-
SHA512
95c92c8f406ebde3e5ca7aa4038d9314bb8fb884642cfcdaeea5a14027bd5448eb57abb0c63d847063094834d273f811cab6ffbf9c9bdd007c03a7feb3e470fc
-
SSDEEP
24576:wyC5+n2UE50aeuIsqC/G7LYDPTDOlG1E89yHJohoZAc3:3C5o2UStet9EGAnDOYFyJo2F
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-