General
-
Target
cba9f2e5cea06fc8287a3c7987fbe703d1e59c3089a3241a7dd673cdc3e076c3
-
Size
892KB
-
Sample
231113-2kpw9sfc6z
-
MD5
5d3131a868e493ceabb4647f5c9587bf
-
SHA1
bbe56c732ce5cb1a09b79ca2e87163e4347e6be7
-
SHA256
cba9f2e5cea06fc8287a3c7987fbe703d1e59c3089a3241a7dd673cdc3e076c3
-
SHA512
f55d90afe75bec7f9bffa3cc26a7b78cc3f0085660f0953766e7cfaa84b63444a60f4782a546b8d8cbf1e4737e2802673fbf10bbe40cdf03b3d991fa77b9fe5b
-
SSDEEP
24576:/yT/h8U1y/5b9AIbjznhXGZNyKxMhJr/4BGx:KTGU0/5ScozNsr/wG
Static task
static1
Behavioral task
behavioral1
Sample
cba9f2e5cea06fc8287a3c7987fbe703d1e59c3089a3241a7dd673cdc3e076c3.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
cba9f2e5cea06fc8287a3c7987fbe703d1e59c3089a3241a7dd673cdc3e076c3
-
Size
892KB
-
MD5
5d3131a868e493ceabb4647f5c9587bf
-
SHA1
bbe56c732ce5cb1a09b79ca2e87163e4347e6be7
-
SHA256
cba9f2e5cea06fc8287a3c7987fbe703d1e59c3089a3241a7dd673cdc3e076c3
-
SHA512
f55d90afe75bec7f9bffa3cc26a7b78cc3f0085660f0953766e7cfaa84b63444a60f4782a546b8d8cbf1e4737e2802673fbf10bbe40cdf03b3d991fa77b9fe5b
-
SSDEEP
24576:/yT/h8U1y/5b9AIbjznhXGZNyKxMhJr/4BGx:KTGU0/5ScozNsr/wG
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-