General
-
Target
55b087ca72ace14d8303f9f107731393daea4b6d5c00a832eac4fbaa6a77db7a
-
Size
1.3MB
-
Sample
231112-dyxbhadc99
-
MD5
7dba26d81810ba290304c46ef7b58104
-
SHA1
36fb016e980cf07a83311eef4656c8026c0635e4
-
SHA256
55b087ca72ace14d8303f9f107731393daea4b6d5c00a832eac4fbaa6a77db7a
-
SHA512
1fbddc56f5fe00619eab4866ceb4355d92e82059f57c453be416623ac66c9f91c8b6caa5c44c11be327a2061603bc38af6623441f41c8bacb1417155ac5107cd
-
SSDEEP
24576:fyOOwMF0n5/iaebIsgCiGt5CDDTfzgj4EeJeouaof/JMTRkP:qOOH05TeUJhGKHbz4tgoXOR
Static task
static1
Behavioral task
behavioral1
Sample
55b087ca72ace14d8303f9f107731393daea4b6d5c00a832eac4fbaa6a77db7a.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
55b087ca72ace14d8303f9f107731393daea4b6d5c00a832eac4fbaa6a77db7a
-
Size
1.3MB
-
MD5
7dba26d81810ba290304c46ef7b58104
-
SHA1
36fb016e980cf07a83311eef4656c8026c0635e4
-
SHA256
55b087ca72ace14d8303f9f107731393daea4b6d5c00a832eac4fbaa6a77db7a
-
SHA512
1fbddc56f5fe00619eab4866ceb4355d92e82059f57c453be416623ac66c9f91c8b6caa5c44c11be327a2061603bc38af6623441f41c8bacb1417155ac5107cd
-
SSDEEP
24576:fyOOwMF0n5/iaebIsgCiGt5CDDTfzgj4EeJeouaof/JMTRkP:qOOH05TeUJhGKHbz4tgoXOR
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-