General
-
Target
0c5b40fbabd22d7b3717286e6e4df432.bin
-
Size
1.2MB
-
Sample
231113-bgwmjaeh3s
-
MD5
61a904f017a1bb81cb64f988acb95f99
-
SHA1
3401da89a6c6e7666c5159f3036dd5e996d83b19
-
SHA256
8e091021132307cb42a2d9d3ce1a29688913e98ac3ecc55f814a2017edd0afc3
-
SHA512
32f54a844c06f9a0c0f613249a90add576f3f0ab5ec5eb79677236fb70bc48e59d97a3181876b9c54366ec2838533ec018e2072a4b512cfd58257359b01d54ef
-
SSDEEP
24576:UuhlwQrCkoQPLQ1uWOKfHG9FBfLJYhUwAeRiyjVlWm:UEDo9OqG9TLJYyYl/
Static task
static1
Behavioral task
behavioral1
Sample
7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123.exe
-
Size
1.3MB
-
MD5
0c5b40fbabd22d7b3717286e6e4df432
-
SHA1
9b8b2a417cf31a3e0d7ee5cde763e89a7c1ae296
-
SHA256
7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123
-
SHA512
d0b3396649579d4ed53d7c57681511b4b23ee7d3f239dd345a8acddd9ace633bc91e6e710c0c2c08aab8d963727b47c14b011a1e89e65303c990203477c04c67
-
SSDEEP
24576:myCw54TPgJzCJaeaIsUCCGpAfDoEMD+S97T6F6B0E/OVWoDn5Ektgu6WG:1CsukehJxGI03l97T067mWoDttH
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-