General
-
Target
bd1eb9bfa4ea384e19d0d9d1413d3473.bin
-
Size
873KB
-
Sample
231112-dkxecacf4z
-
MD5
39fe6d5f9a6b569add03d7a88f5efd64
-
SHA1
87ac90db1c292849e844ec990699435536559a38
-
SHA256
6d2b194595a87e02193845a1adc118d752c75676187fcd9c7101930c655d9d98
-
SHA512
2d90f0a14a9a8cc3203446e673740e6e6aeb3081b2986e3bdc86665fa9b4f68ddd1513ddf91f65992a8d196a950d29e7a98bf370940779f7539d278d76ff1df1
-
SSDEEP
12288:iomCybIOTD4+LA8SK1E0DDimKQZlSGQIj2BbLG98yVdsHuK4MqhrUFGS9Rq69S:inPVTD4LubDdLDQL+8y33AqNU99JY
Static task
static1
Behavioral task
behavioral1
Sample
b05b5b5854ce0c5b00dca2d9cda190cccabd42550ee3b0353f3387472cc29e13.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
b05b5b5854ce0c5b00dca2d9cda190cccabd42550ee3b0353f3387472cc29e13.exe
-
Size
917KB
-
MD5
bd1eb9bfa4ea384e19d0d9d1413d3473
-
SHA1
1061ef813c51e59b1bdd3dce80d506f9bb127483
-
SHA256
b05b5b5854ce0c5b00dca2d9cda190cccabd42550ee3b0353f3387472cc29e13
-
SHA512
9900fc86c53c5e0cd9e79b0c19b484708d8dd247389f2d0246cf76236e6b1869270e0fcdf58aa45b4252e110c0f65b8d480fa4cffe2eca10d11ebf65295cf87b
-
SSDEEP
24576:8yE5waeuIs6C/GFLYDD2qvLD7HDZyHwkL+6Srp:rSJettEG+Wejj8Sr
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-