General
-
Target
3e85c5b90f8d7b3f2ae367c6b611bea63e6fdb9fae03bda7125cea8f77ae9d0b
-
Size
1.3MB
-
Sample
231112-drlanacf6w
-
MD5
2ee5707b1656fefd192239d464d6aacd
-
SHA1
9849c14b8829c3e7ffc738199fc47babaffe57f8
-
SHA256
3e85c5b90f8d7b3f2ae367c6b611bea63e6fdb9fae03bda7125cea8f77ae9d0b
-
SHA512
5836029135076e5ad11281277b7f3326353b355d8595122f3bfadf1c50650cd44a81b967fdb78910aaeb52269a521aad03f1f3bc4bc6cde85f3f825ef894ae0d
-
SSDEEP
24576:gyNi2GuJ7FcbMiaeeIshCuG2vTDGGjoFwIfjox29rZSYpM0zI5JEZI8IY:nNF7jredOZGElGok9kWbzl
Static task
static1
Behavioral task
behavioral1
Sample
3e85c5b90f8d7b3f2ae367c6b611bea63e6fdb9fae03bda7125cea8f77ae9d0b.exe
Resource
win10-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
3e85c5b90f8d7b3f2ae367c6b611bea63e6fdb9fae03bda7125cea8f77ae9d0b
-
Size
1.3MB
-
MD5
2ee5707b1656fefd192239d464d6aacd
-
SHA1
9849c14b8829c3e7ffc738199fc47babaffe57f8
-
SHA256
3e85c5b90f8d7b3f2ae367c6b611bea63e6fdb9fae03bda7125cea8f77ae9d0b
-
SHA512
5836029135076e5ad11281277b7f3326353b355d8595122f3bfadf1c50650cd44a81b967fdb78910aaeb52269a521aad03f1f3bc4bc6cde85f3f825ef894ae0d
-
SSDEEP
24576:gyNi2GuJ7FcbMiaeeIshCuG2vTDGGjoFwIfjox29rZSYpM0zI5JEZI8IY:nNF7jredOZGElGok9kWbzl
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-