General
-
Target
0646e46427bfc7f744d2b44fca662fe716a5233f85d01f29f2a864437c4cfc07
-
Size
371KB
-
Sample
231112-p1q32sfe2w
-
MD5
7be34453816738d29437045fd8d3b0c5
-
SHA1
f0d41a8c1da7eba13864d0871604a5b828d3e7fe
-
SHA256
0646e46427bfc7f744d2b44fca662fe716a5233f85d01f29f2a864437c4cfc07
-
SHA512
6d45215df6c3437376bd18bdb72a3131d02f2a2519c1f875c99f266b84d130c752f6329c8bd5976ae6a8a35d2516273238bab3b726cb35047e6133aeff2e9122
-
SSDEEP
6144:Kiy+bnr+Ep0yN90QE0Z4VV2T8fiRvwkKcv8EX0WIQFM3nua9yF3wvDYk:GMrYy90Y4VVfiRvwHfEX0i82G
Static task
static1
Behavioral task
behavioral1
Sample
0646e46427bfc7f744d2b44fca662fe716a5233f85d01f29f2a864437c4cfc07.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
0646e46427bfc7f744d2b44fca662fe716a5233f85d01f29f2a864437c4cfc07
-
Size
371KB
-
MD5
7be34453816738d29437045fd8d3b0c5
-
SHA1
f0d41a8c1da7eba13864d0871604a5b828d3e7fe
-
SHA256
0646e46427bfc7f744d2b44fca662fe716a5233f85d01f29f2a864437c4cfc07
-
SHA512
6d45215df6c3437376bd18bdb72a3131d02f2a2519c1f875c99f266b84d130c752f6329c8bd5976ae6a8a35d2516273238bab3b726cb35047e6133aeff2e9122
-
SSDEEP
6144:Kiy+bnr+Ep0yN90QE0Z4VV2T8fiRvwkKcv8EX0WIQFM3nua9yF3wvDYk:GMrYy90Y4VVfiRvwHfEX0i82G
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-