General
-
Target
NEAS.7224a67c838c764592d15509ffcb4788625701cc1e47b38d6a587aa4487d9461.exe
-
Size
1.3MB
-
Sample
231112-xb9g4aae5w
-
MD5
0c12cd0538bea9f88b40d52cf438f139
-
SHA1
80f36d865b30b3044344ea20f58781726918f0ca
-
SHA256
7224a67c838c764592d15509ffcb4788625701cc1e47b38d6a587aa4487d9461
-
SHA512
e561c216f23613c916d33ad9639a490ee135e0f46eb8b28fce6c31672aed97624287cd130a17ada503547992e231c4fdb97840858c291fbb6bc942ed3b804a46
-
SSDEEP
24576:RyVyuGfYIqxaeSIsLClGqbrDnURNhWl6RIQYFQPJUEd:EVLr8epAMGokhY2PO
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7224a67c838c764592d15509ffcb4788625701cc1e47b38d6a587aa4487d9461.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.7224a67c838c764592d15509ffcb4788625701cc1e47b38d6a587aa4487d9461.exe
-
Size
1.3MB
-
MD5
0c12cd0538bea9f88b40d52cf438f139
-
SHA1
80f36d865b30b3044344ea20f58781726918f0ca
-
SHA256
7224a67c838c764592d15509ffcb4788625701cc1e47b38d6a587aa4487d9461
-
SHA512
e561c216f23613c916d33ad9639a490ee135e0f46eb8b28fce6c31672aed97624287cd130a17ada503547992e231c4fdb97840858c291fbb6bc942ed3b804a46
-
SSDEEP
24576:RyVyuGfYIqxaeSIsLClGqbrDnURNhWl6RIQYFQPJUEd:EVLr8epAMGokhY2PO
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-