General
-
Target
82e3f6609a70db99ce5665b721eb287ee4d7d270661728e0d6cb4eeaea882bfa
-
Size
886KB
-
Sample
231113-2dr32sfg94
-
MD5
8ecaf353e7045fc511ae4dc69e7ed597
-
SHA1
fad1515b8efb456fb1f19e3f6bd28c889d246cc7
-
SHA256
82e3f6609a70db99ce5665b721eb287ee4d7d270661728e0d6cb4eeaea882bfa
-
SHA512
24fd573513abcf4917ab5461fef3768aab95672906a91dcf7e107742d04473a707977735e6af3a3a1de8c53def32baac20d3e3f3f870f93cf4467deddcd4e1f5
-
SSDEEP
12288:UMrHy90glCgRVirR9XZAbM1ckX9e/mIHkPCR3tPHVaZ0gjHYusq/H3i3DzJf4:LyFncfXZ+UDkltP1aZ0gLbHyDza
Static task
static1
Behavioral task
behavioral1
Sample
82e3f6609a70db99ce5665b721eb287ee4d7d270661728e0d6cb4eeaea882bfa.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
82e3f6609a70db99ce5665b721eb287ee4d7d270661728e0d6cb4eeaea882bfa
-
Size
886KB
-
MD5
8ecaf353e7045fc511ae4dc69e7ed597
-
SHA1
fad1515b8efb456fb1f19e3f6bd28c889d246cc7
-
SHA256
82e3f6609a70db99ce5665b721eb287ee4d7d270661728e0d6cb4eeaea882bfa
-
SHA512
24fd573513abcf4917ab5461fef3768aab95672906a91dcf7e107742d04473a707977735e6af3a3a1de8c53def32baac20d3e3f3f870f93cf4467deddcd4e1f5
-
SSDEEP
12288:UMrHy90glCgRVirR9XZAbM1ckX9e/mIHkPCR3tPHVaZ0gjHYusq/H3i3DzJf4:LyFncfXZ+UDkltP1aZ0gLbHyDza
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-