General
-
Target
NEAS.7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123.exe
-
Size
1.3MB
-
Sample
231112-vraycshh42
-
MD5
0c5b40fbabd22d7b3717286e6e4df432
-
SHA1
9b8b2a417cf31a3e0d7ee5cde763e89a7c1ae296
-
SHA256
7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123
-
SHA512
d0b3396649579d4ed53d7c57681511b4b23ee7d3f239dd345a8acddd9ace633bc91e6e710c0c2c08aab8d963727b47c14b011a1e89e65303c990203477c04c67
-
SSDEEP
24576:myCw54TPgJzCJaeaIsUCCGpAfDoEMD+S97T6F6B0E/OVWoDn5Ektgu6WG:1CsukehJxGI03l97T067mWoDttH
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123.exe
-
Size
1.3MB
-
MD5
0c5b40fbabd22d7b3717286e6e4df432
-
SHA1
9b8b2a417cf31a3e0d7ee5cde763e89a7c1ae296
-
SHA256
7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123
-
SHA512
d0b3396649579d4ed53d7c57681511b4b23ee7d3f239dd345a8acddd9ace633bc91e6e710c0c2c08aab8d963727b47c14b011a1e89e65303c990203477c04c67
-
SSDEEP
24576:myCw54TPgJzCJaeaIsUCCGpAfDoEMD+S97T6F6B0E/OVWoDn5Ektgu6WG:1CsukehJxGI03l97T067mWoDttH
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-