General
-
Target
fe4b1bb2a1c62a725fde05966feb1ba1.bin
-
Size
873KB
-
Sample
231112-ehzbladd94
-
MD5
45c4a506358dbc07846cfd1e5a1f64d2
-
SHA1
82d5c606a305b9d4b48aa932790dc8b42edc2146
-
SHA256
60914e7b5981a2a998e83e1901a21bef6fcc55a92f760693678258eae42aeddc
-
SHA512
f2adb0a8ca7bfd5b7de78f1b1bcb6f923a35544fc5ed0c686273c6520353365c36340af61a793fcecc1d083b3dab55ef32f106218e71829eb34eb28aa5c4287d
-
SSDEEP
24576:Oi1n/kqI/C7kdJxaiuKijMcb8C8DXXQUm9bVHi86qRLZkT52:hJMqmY1vb8C8YTi8hLGl2
Static task
static1
Behavioral task
behavioral1
Sample
0318a39c985b9af2d7fb6d6fe9d56eb1c464545d4994db3508b54d42987e1201.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
0318a39c985b9af2d7fb6d6fe9d56eb1c464545d4994db3508b54d42987e1201.exe
-
Size
917KB
-
MD5
fe4b1bb2a1c62a725fde05966feb1ba1
-
SHA1
0d8622306a0396b9f9405cc1dcd8dd9665df58be
-
SHA256
0318a39c985b9af2d7fb6d6fe9d56eb1c464545d4994db3508b54d42987e1201
-
SHA512
0a2de1420b40054f3018072bde54cecf15addd2d228798bec93a967f400faf0d0bf89aff1adb83a4e92d7d336480879d3c5bc6d8b9f1cc22c09caff49b3941ec
-
SSDEEP
24576:dyG2QdhO81i/aeuIs+C/GzLYDXVGkSR5KGnMZXBkfKfm:4G22O81iietBEG4MB5KsEXYK
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-