General
-
Target
5d15fe5f38010cb1733bdd095979c0c8cdd21a0c8efee9516a92eb1755ee8108
-
Size
1.3MB
-
Sample
231112-s4gkkahb92
-
MD5
de4d5826a54b9a63aa41eec5d531f9bc
-
SHA1
fb071dc488e1ba733bdf696e72a9d35a3b120c03
-
SHA256
5d15fe5f38010cb1733bdd095979c0c8cdd21a0c8efee9516a92eb1755ee8108
-
SHA512
a2103ac59ff27087f5dee559d6b83bd10c202db45882f3065976f6824420e12ec68477386e59d19acc82008e189e3404003ff66758d5382c155a48b21f1c738a
-
SSDEEP
24576:hyUK+J5NyctaeyIssCAGbdlD8rhhNJfRUKVImCGcSKkpkJFsxPMI6:UU5JtoeJrzGLihFySL38j+M
Static task
static1
Behavioral task
behavioral1
Sample
5d15fe5f38010cb1733bdd095979c0c8cdd21a0c8efee9516a92eb1755ee8108.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
5d15fe5f38010cb1733bdd095979c0c8cdd21a0c8efee9516a92eb1755ee8108
-
Size
1.3MB
-
MD5
de4d5826a54b9a63aa41eec5d531f9bc
-
SHA1
fb071dc488e1ba733bdf696e72a9d35a3b120c03
-
SHA256
5d15fe5f38010cb1733bdd095979c0c8cdd21a0c8efee9516a92eb1755ee8108
-
SHA512
a2103ac59ff27087f5dee559d6b83bd10c202db45882f3065976f6824420e12ec68477386e59d19acc82008e189e3404003ff66758d5382c155a48b21f1c738a
-
SSDEEP
24576:hyUK+J5NyctaeyIssCAGbdlD8rhhNJfRUKVImCGcSKkpkJFsxPMI6:UU5JtoeJrzGLihFySL38j+M
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-