General
-
Target
e1e81d5f4eb8e3a4784d17d12970f212d3bafa2584c69bd81821ba30076cd96d
-
Size
1.4MB
-
Sample
231112-xzp4csah4x
-
MD5
409a6f8b516eeefb33316a9057898eb7
-
SHA1
d79fe80acc4ce397bef1afce0b90b8ae04c648e0
-
SHA256
e1e81d5f4eb8e3a4784d17d12970f212d3bafa2584c69bd81821ba30076cd96d
-
SHA512
2f11c73f28161d48269215da555e79c9dbda6beff67c5a5721e1187c509ab9d3024de6ef0a7034dd35ee68866c10e3f1319a64166414fa739a6c75eca4511fca
-
SSDEEP
24576:PyprHugHcb699nS3MelIsL9vGuxwDPlCDj7D9lYCmnZLQ352uf/XvYd:apDuYY69YcemUpG7RCrDXYCmnZu2ivv
Static task
static1
Behavioral task
behavioral1
Sample
e1e81d5f4eb8e3a4784d17d12970f212d3bafa2584c69bd81821ba30076cd96d.exe
Resource
win10-20231020-en
Behavioral task
behavioral2
Sample
e1e81d5f4eb8e3a4784d17d12970f212d3bafa2584c69bd81821ba30076cd96d.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
e1e81d5f4eb8e3a4784d17d12970f212d3bafa2584c69bd81821ba30076cd96d
-
Size
1.4MB
-
MD5
409a6f8b516eeefb33316a9057898eb7
-
SHA1
d79fe80acc4ce397bef1afce0b90b8ae04c648e0
-
SHA256
e1e81d5f4eb8e3a4784d17d12970f212d3bafa2584c69bd81821ba30076cd96d
-
SHA512
2f11c73f28161d48269215da555e79c9dbda6beff67c5a5721e1187c509ab9d3024de6ef0a7034dd35ee68866c10e3f1319a64166414fa739a6c75eca4511fca
-
SSDEEP
24576:PyprHugHcb699nS3MelIsL9vGuxwDPlCDj7D9lYCmnZLQ352uf/XvYd:apDuYY69YcemUpG7RCrDXYCmnZu2ivv
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-