General
-
Target
NEAS.134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6.exe
-
Size
1.3MB
-
Sample
231112-xdn9yabb26
-
MD5
93de95190406d77bed0efceb4c1dbf43
-
SHA1
4e355c118045771a2cc90272482fbc446d338a5c
-
SHA256
134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6
-
SHA512
8758327f924787878295fe97d7213071c470bd2454a7241c79f126cbfe8a553da1fc5dc10761fe76b36282a4de9def6e5703181d9f62c0769e4dd60101e932c5
-
SSDEEP
24576:uyYUHIfgZI9faepIstCiGldXD69ya6k6tGQtjZBSBgz5d:9Y0IfbCeS0LGP+UGQxZoBa5
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6.exe
-
Size
1.3MB
-
MD5
93de95190406d77bed0efceb4c1dbf43
-
SHA1
4e355c118045771a2cc90272482fbc446d338a5c
-
SHA256
134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6
-
SHA512
8758327f924787878295fe97d7213071c470bd2454a7241c79f126cbfe8a553da1fc5dc10761fe76b36282a4de9def6e5703181d9f62c0769e4dd60101e932c5
-
SSDEEP
24576:uyYUHIfgZI9faepIstCiGldXD69ya6k6tGQtjZBSBgz5d:9Y0IfbCeS0LGP+UGQxZoBa5
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-