General
-
Target
c40276ad0eb1038cd024c5e4babcf263.bin
-
Size
874KB
-
Sample
231112-dpnm1acf5y
-
MD5
ef398d08af7dc930611abc8a5f86bb4b
-
SHA1
89d614be8ab384f49152f93793d45c8f762caee8
-
SHA256
f301efaa69bf684e38050f7562cf250802d0037a8227e084cb2e0ca96bf166a4
-
SHA512
f10668f26a3fa693e389ead48c13f985de507446526342b60e33f59d1c14ce4909d76fefb396ca327f0e08a72836ceab0500fc58b5f73a91d42797642904fed5
-
SSDEEP
12288:VRO0KNd53RuHPn7XKR6nA67NhhheXSlDKKxbnz+8rqTHXvUsPIly1AZuptr50WtZ:/O0ARYP7aR6dKPWH+8mTsMH0Wta2
Static task
static1
Behavioral task
behavioral1
Sample
6b362b2e24b31baf1345b1510806cdd4ac3af1ad704881421ceae5360312eed8.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
6b362b2e24b31baf1345b1510806cdd4ac3af1ad704881421ceae5360312eed8.exe
-
Size
917KB
-
MD5
c40276ad0eb1038cd024c5e4babcf263
-
SHA1
350dc700c78effca3ad37c1020de1ed28e80e052
-
SHA256
6b362b2e24b31baf1345b1510806cdd4ac3af1ad704881421ceae5360312eed8
-
SHA512
b2adfdea23fbddaf31101a3daeab1befbb342bcc4c7be75528f6052b6c5c14d5c323345a0ca00f21e7d663198964201a8af0bce37840a5b24a2f07c8efb60306
-
SSDEEP
24576:iy0ePFmaeuIsGC/GzLYDLffac1GNhp0ceplJ:J3etBEG4iPfp0Fl
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-