General
-
Target
888df5653562869a84e92ebe444b732d40bddc14b914206695d0160fa18cd748
-
Size
372KB
-
Sample
231112-pfcd6afb7z
-
MD5
86de6dfaa3cb85403d5a8fd2974e01ac
-
SHA1
969edc452a153640750326eb15823d55c8da2a62
-
SHA256
888df5653562869a84e92ebe444b732d40bddc14b914206695d0160fa18cd748
-
SHA512
dc11090ff05eb4363b1b5d1436fff1f68147cfdfbfdfe9d5b5cda8b792a0130a0d732134ff8f831a3a0014e80c55772fcdbe805a501467977f813f49e7534709
-
SSDEEP
6144:KNy+bnr+hp0yN90QEEZREi98m15+juNBNQZYggbfOF7XDHmF/g4:XMrly90gRES8q5IurVfADQ/g4
Static task
static1
Behavioral task
behavioral1
Sample
888df5653562869a84e92ebe444b732d40bddc14b914206695d0160fa18cd748.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
888df5653562869a84e92ebe444b732d40bddc14b914206695d0160fa18cd748
-
Size
372KB
-
MD5
86de6dfaa3cb85403d5a8fd2974e01ac
-
SHA1
969edc452a153640750326eb15823d55c8da2a62
-
SHA256
888df5653562869a84e92ebe444b732d40bddc14b914206695d0160fa18cd748
-
SHA512
dc11090ff05eb4363b1b5d1436fff1f68147cfdfbfdfe9d5b5cda8b792a0130a0d732134ff8f831a3a0014e80c55772fcdbe805a501467977f813f49e7534709
-
SSDEEP
6144:KNy+bnr+hp0yN90QEEZREi98m15+juNBNQZYggbfOF7XDHmF/g4:XMrly90gRES8q5IurVfADQ/g4
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-