General
-
Target
NEAS.6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac.exe
-
Size
1.3MB
-
Sample
231112-w9j5esad7s
-
MD5
5e58c7210f9f0753d651e7207240e728
-
SHA1
31b5afd364f5a2ead3433048ee999decf634b12b
-
SHA256
6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac
-
SHA512
d5a3e34e5e83b2022f370f1e7431a32e988d67162b30d7bb23d4f347a501c3eb8f6dcc6d094f58d87d277bb3a609a6cd8af614c64acffa2989314f692d9eaac6
-
SSDEEP
24576:2y15jmqo3i96mFae1IsOC0GjShD1IKAKqfV7qYJ0nK8pF9zhfNvK:F15jm9e6xe2jfGiiKte7Fend1
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac.exe
-
Size
1.3MB
-
MD5
5e58c7210f9f0753d651e7207240e728
-
SHA1
31b5afd364f5a2ead3433048ee999decf634b12b
-
SHA256
6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac
-
SHA512
d5a3e34e5e83b2022f370f1e7431a32e988d67162b30d7bb23d4f347a501c3eb8f6dcc6d094f58d87d277bb3a609a6cd8af614c64acffa2989314f692d9eaac6
-
SSDEEP
24576:2y15jmqo3i96mFae1IsOC0GjShD1IKAKqfV7qYJ0nK8pF9zhfNvK:F15jm9e6xe2jfGiiKte7Fend1
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-