General
-
Target
NEAS.b059c933236a8fb4090e189992f70e925bdee71814c2064642698b41f3c32c8c.exe
-
Size
1.3MB
-
Sample
231112-w9vadsba35
-
MD5
a70e240d6318d81d5a77a07e5edf9d62
-
SHA1
2280407baf5d363ef6c99448547a0c9c36e51b97
-
SHA256
b059c933236a8fb4090e189992f70e925bdee71814c2064642698b41f3c32c8c
-
SHA512
0bc4f33f9a77738ba768b720099a8e36e05c661c9c6418a93bc4d357e280668c12dd2af99e821423dc316d5cf39a6fcc37d5e0ffac6df7d1ae955aec3aa8cfb7
-
SSDEEP
24576:eyFQ5Rt24FLy89saeFIsgCWGXmIDXSAb2brhAhYdpH4s5D59pp:tFUd1eGFDGLTXkahYdt4s5tb
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b059c933236a8fb4090e189992f70e925bdee71814c2064642698b41f3c32c8c.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.b059c933236a8fb4090e189992f70e925bdee71814c2064642698b41f3c32c8c.exe
-
Size
1.3MB
-
MD5
a70e240d6318d81d5a77a07e5edf9d62
-
SHA1
2280407baf5d363ef6c99448547a0c9c36e51b97
-
SHA256
b059c933236a8fb4090e189992f70e925bdee71814c2064642698b41f3c32c8c
-
SHA512
0bc4f33f9a77738ba768b720099a8e36e05c661c9c6418a93bc4d357e280668c12dd2af99e821423dc316d5cf39a6fcc37d5e0ffac6df7d1ae955aec3aa8cfb7
-
SSDEEP
24576:eyFQ5Rt24FLy89saeFIsgCWGXmIDXSAb2brhAhYdpH4s5D59pp:tFUd1eGFDGLTXkahYdt4s5tb
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-