General
-
Target
c886439281ce82a91ac41d7f7abc7163.bin
-
Size
873KB
-
Sample
231112-dtekwscf6y
-
MD5
848c18eaafd2a7a13a7b04f7c643a2b6
-
SHA1
537ab0e6747827b1a8b3471427e45de7e8f7f416
-
SHA256
9304052e1a48781ab0e6053d216b51c66461c757f717ce6f47cbf96f9befd2c4
-
SHA512
43ef1c0c0db7964ba6fd0bfbd3f2a8932d8de21065647508ed6ae2e406d2a6e0e1b4749a5a65b4903f7b98b7655937197f5a73c22ba787b02bfb687f5b5a846c
-
SSDEEP
24576:6NJgg/M7m2f/sOXXOeqOojPdxQH79Zypt97ImwvFBL7Zu:K+gUCLOX+eu5yKpDMdbXY
Static task
static1
Behavioral task
behavioral1
Sample
4db895f4018f06aba809a04e9ad881155a615ffd37dc5280b92c9c7b65766723.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
4db895f4018f06aba809a04e9ad881155a615ffd37dc5280b92c9c7b65766723.exe
-
Size
917KB
-
MD5
c886439281ce82a91ac41d7f7abc7163
-
SHA1
6c845bacf21033100d484bd4a4612ab8ce258b77
-
SHA256
4db895f4018f06aba809a04e9ad881155a615ffd37dc5280b92c9c7b65766723
-
SHA512
cfe4647f7b3c4fc7361c8d66aacce0d4a02ea19af468f43e138d0daa2203a4f532eaffaf25a1ca165b370e81793c09eb82e38c257d4fab6b324b652713dd566b
-
SSDEEP
24576:wy6Pn7aeuIsuC/GRLYD/RaBJwX6mnALRAp31:3Q+etZEGK4/spEAp
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-