General
-
Target
bda9050ceb04ebf7a49d315b7ec51ac3.bin
-
Size
879KB
-
Sample
231112-dk52gsdc56
-
MD5
34ff9df229e6a2be5935f6e8dab81e51
-
SHA1
3ce6f59985bd5890b477d3a4edb0ca720c37e9a3
-
SHA256
eee07d2010090f6ee3d096a433e732621b2af0b12962f66a85e34cb78d3d3573
-
SHA512
a7e3bf3996c7203aef6aa0847d607aee7b2e88132f40957945d63ba9567aa82d8c0649394bbeda944bdf52547e52f775609eeb10c64ecaff3363936b2fb4cdbc
-
SSDEEP
24576:Y3o+nCcRVWM7uibArx3gqZ6xhlrxS45hzpIuoQqYadI3:Y3VnCAxBsrExj5hSuxqC
Static task
static1
Behavioral task
behavioral1
Sample
237dd269593914e0571b27022a25a61f4fb3a1af73c66e39711c611f0a7985e3.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
237dd269593914e0571b27022a25a61f4fb3a1af73c66e39711c611f0a7985e3.exe
-
Size
923KB
-
MD5
bda9050ceb04ebf7a49d315b7ec51ac3
-
SHA1
31947c9225deacae9ca32312177ff5547616addc
-
SHA256
237dd269593914e0571b27022a25a61f4fb3a1af73c66e39711c611f0a7985e3
-
SHA512
4abd73a056d2bee9857824369ad6ed50021931819db09710c96b228297b2c38e2f8966ee3193ee3e256925c2ca923198b02e7f3eaf2d4c8111ea25c3f9202f0a
-
SSDEEP
24576:6yJoO7aaeuIsWC/GZLYD3Ou0Nm7KduH6l:BC2etPEGyq1sH
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-