General
-
Target
79bf4926941553da03da58b35771fb2bc4731fc79b6bd09ab07f2af7c68ac398
-
Size
1.3MB
-
Sample
231112-jwe74add8x
-
MD5
e71d748fed86fd7d54340aa2bda52bea
-
SHA1
748ed2457c963f0597ffa6a5417d89e5b0ca0246
-
SHA256
79bf4926941553da03da58b35771fb2bc4731fc79b6bd09ab07f2af7c68ac398
-
SHA512
ad97974321a8fb06dd3fb181d4d3bde6dc1f6eea1f17577c86bb6a7dc9d558ef3b26fc8556299cd4f13c990064ba38af29ef90b97ea038aafb0d104d6fef5302
-
SSDEEP
24576:zyAgQ13VeOSJbaeIIs1CyGdqSDHA9kC3ITBOL8rAF/6YQQh3j:Gd0geefuhGnTAiC3UO4rG6YQQh
Static task
static1
Behavioral task
behavioral1
Sample
79bf4926941553da03da58b35771fb2bc4731fc79b6bd09ab07f2af7c68ac398.exe
Resource
win10-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
79bf4926941553da03da58b35771fb2bc4731fc79b6bd09ab07f2af7c68ac398
-
Size
1.3MB
-
MD5
e71d748fed86fd7d54340aa2bda52bea
-
SHA1
748ed2457c963f0597ffa6a5417d89e5b0ca0246
-
SHA256
79bf4926941553da03da58b35771fb2bc4731fc79b6bd09ab07f2af7c68ac398
-
SHA512
ad97974321a8fb06dd3fb181d4d3bde6dc1f6eea1f17577c86bb6a7dc9d558ef3b26fc8556299cd4f13c990064ba38af29ef90b97ea038aafb0d104d6fef5302
-
SSDEEP
24576:zyAgQ13VeOSJbaeIIs1CyGdqSDHA9kC3ITBOL8rAF/6YQQh3j:Gd0geefuhGnTAiC3UO4rG6YQQh
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-