General
-
Target
a13c2608bc3f12fa340363e5ee8209f6.bin
-
Size
875KB
-
Sample
231112-db2ygace9x
-
MD5
91766cd1b2eda3286903f791a5d21a88
-
SHA1
508ec706cfea5f3726692f64c65e223dd3438bb8
-
SHA256
35df5c45a300393e76a342e309e89b0c28ead964f52b380ea3ea7d72ed429163
-
SHA512
f74aa3410bd4f5bf2190aef1eeabe02752652ffbaf35259c3e6b99892106f5d69cf3dd8634b27287794ba2ef4aab63ce0c52ec21fd2cc23fe8a25789d3c1f515
-
SSDEEP
24576:QY7zD0WLv86BRLVti/9lxMbjV4uWuV6w/cXH4D4y:QY3dpVtiLWjP6w0XYF
Static task
static1
Behavioral task
behavioral1
Sample
722b697b069f14055f310f1fce742889c4207dea00f0cb912a4d105c1403f72e.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
722b697b069f14055f310f1fce742889c4207dea00f0cb912a4d105c1403f72e.exe
-
Size
918KB
-
MD5
a13c2608bc3f12fa340363e5ee8209f6
-
SHA1
e38c4caa67fae600467638d6277f52c5b1dc3113
-
SHA256
722b697b069f14055f310f1fce742889c4207dea00f0cb912a4d105c1403f72e
-
SHA512
ab28506e4c42ac98bb45ea598bb455d8aaafabf57d1fad610ddae4c262d37db9bb9ce99ec3fd364442c509b08f7ae34259b17667ac8154aaa21af17be6915cb7
-
SSDEEP
24576:Ny+vp1sN5/haeuIs6C/GVLYDDg3DZCSC8bL8:odN50et7EGuED0cL
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-