General
-
Target
fc36af7f28a807d40b48cc4bc024e405.bin
-
Size
877KB
-
Sample
231112-eetxpscg7s
-
MD5
77709139825fd012d651c607d9f7e3d8
-
SHA1
990d3bcf41532b4446fecb65a13d87e21620ad50
-
SHA256
8d53e27ed42b874940dbff853021981b52c80411162839c9e6a33e2be7268c02
-
SHA512
13e1d6bd697b221645fb884477f5ef750984dc96703207d9cd3aa37b7eaee35f64e360960bb84ce3e6c5721250a9cfe050627e266a1e2a790fe85bf5d87f67f0
-
SSDEEP
12288:64nl/bozuMXy4OfmuYKau6xW8bBUwO9CHDhSVgvfQ+ELltY6IUY2n/yvoxdr8ZcE:dBozuq5Cau6A8CF9iY+4tY6IUx6Sdr+9
Static task
static1
Behavioral task
behavioral1
Sample
7bf2f95c02d6a67164588318e925ce09a8da25f5f5f71e50a3fcd84bf84c91f0.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
7bf2f95c02d6a67164588318e925ce09a8da25f5f5f71e50a3fcd84bf84c91f0.exe
-
Size
921KB
-
MD5
fc36af7f28a807d40b48cc4bc024e405
-
SHA1
f99188c686bca68d4d092dbfc95a5990aaf59ccd
-
SHA256
7bf2f95c02d6a67164588318e925ce09a8da25f5f5f71e50a3fcd84bf84c91f0
-
SHA512
7d1a2ad317c02071e93d11db8e55ecc0094ace479f0ac07fa85f4063d44dcf755aec2458382c0592e9ed032c6a5180c9bfc6dd1042330c64e168c2d23f573fc7
-
SSDEEP
24576:3ykoCVATWgaeuIsyC/GjLYD7wID3S8wuKxYsc5W9fQlWq:Cko+5et1EGIwsi8wuty9fQl
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-