General
-
Target
44f37bb3dd9e7cba33e2b6a022866af679a784848b00808597251e2ec6283ed7
-
Size
1.3MB
-
Sample
231112-pz4mragb39
-
MD5
ef0ef77e1eff2a86dd0ab3fb3097d863
-
SHA1
82e8096347efb87b469019d3abeecf8c292d7210
-
SHA256
44f37bb3dd9e7cba33e2b6a022866af679a784848b00808597251e2ec6283ed7
-
SHA512
2dffce757e1841d42ff2b6e386244225cb9d9af5c7849a014757a51c158e33433932cc3c97ab4a1bcb378b5f45411e7acc1b37cf80a60a2cb40b733ac11ced35
-
SSDEEP
24576:MyR02ezLQ9raerIshCRGESCDm0LusImV4ax8ia0DRmWmFA:7R0260uekWEGOyaya+Z01K
Static task
static1
Behavioral task
behavioral1
Sample
44f37bb3dd9e7cba33e2b6a022866af679a784848b00808597251e2ec6283ed7.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
44f37bb3dd9e7cba33e2b6a022866af679a784848b00808597251e2ec6283ed7
-
Size
1.3MB
-
MD5
ef0ef77e1eff2a86dd0ab3fb3097d863
-
SHA1
82e8096347efb87b469019d3abeecf8c292d7210
-
SHA256
44f37bb3dd9e7cba33e2b6a022866af679a784848b00808597251e2ec6283ed7
-
SHA512
2dffce757e1841d42ff2b6e386244225cb9d9af5c7849a014757a51c158e33433932cc3c97ab4a1bcb378b5f45411e7acc1b37cf80a60a2cb40b733ac11ced35
-
SSDEEP
24576:MyR02ezLQ9raerIshCRGESCDm0LusImV4ax8ia0DRmWmFA:7R0260uekWEGOyaya+Z01K
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-