General
-
Target
31e625cb50d48f8f0c9457b35962475b.bin
-
Size
1.2MB
-
Sample
231113-bt9d6afe76
-
MD5
5e345d6692ba82e6b855798de5e2798a
-
SHA1
ba48296e7091bd4c9fc4132a2d6b247ef21fd396
-
SHA256
c8ed283c827f2bbcc2a43646cbcfae72e06c1909b913bae67948aeaa1c7d6c41
-
SHA512
83fff5b852269bd2db5301bd87933c490f407baca861e749113e143406e11afdc09c0e545fcac25393e6708e234cefd4c240362321f285a02e721bf54af3c5f4
-
SSDEEP
24576:5w7TuXs2c/MOxV1h/aLsgyNkZ0jcqW7oET+wM6xf5ctlLmTX3ZposEPCD:C7qsvxrV5gyNDjzWUzGpaFy3ZysLD
Static task
static1
Behavioral task
behavioral1
Sample
fd0f80ba887ecbecb50c9afa76982cb60ada0502570f12c3e2b77c638efa79bc.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
fd0f80ba887ecbecb50c9afa76982cb60ada0502570f12c3e2b77c638efa79bc.exe
-
Size
1.3MB
-
MD5
31e625cb50d48f8f0c9457b35962475b
-
SHA1
ab7cfcca8d144651d8bd3592024a3563b4b1c7c5
-
SHA256
fd0f80ba887ecbecb50c9afa76982cb60ada0502570f12c3e2b77c638efa79bc
-
SHA512
9ac98e97861cb59cbd697a3445a8465ca36cb70c155fd5ab98e7eeb0bc61f424ed76dc3d2e7633af422ef81558e9b6febf9c6eb9ff7e1df97b61c448d6ef540d
-
SSDEEP
24576:ayB4bOk4AaeOIsnCnGTtsD5gXolE9+ch+au+B7hNgQna06qXC:h+baeNiQGm+olUBhBjDnN6
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-