General
-
Target
341f8a069dcbf713a42936d787d8a0d1.bin
-
Size
1.3MB
-
Sample
231113-bvcftafa9v
-
MD5
edc50c4960747fef914703f4e2810a0b
-
SHA1
cae57489ad0519e27baece13fa265363731e0dc2
-
SHA256
382446b01944a53c606853fe4a42fd8e04212ade5f124acf33f7df5175acd338
-
SHA512
4d34372a833bdb99e127f6023005931baebdbfb9fcd31ac795e203a2ecd4204be39e55a90933d939c950f034f7c7bc09afbc69ea6162697290fbb10cbc49381c
-
SSDEEP
24576:+Y4gMki0fdPoTTcveRwp0hGLUeyVB8ot5yce3LXPEIsMhibL8LNoD8vjE0RJ3H6G:+mMkiOZoTT5fGu6W57ebfEINcI5oDMj3
Static task
static1
Behavioral task
behavioral1
Sample
6f5029869984f774932ee5eec105cec8daeeb1f5c6411a8089c8dcb0e9ab7747.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
6f5029869984f774932ee5eec105cec8daeeb1f5c6411a8089c8dcb0e9ab7747.exe
-
Size
1.3MB
-
MD5
341f8a069dcbf713a42936d787d8a0d1
-
SHA1
93cf489987decb1d262cf3ee38f9eef062f566da
-
SHA256
6f5029869984f774932ee5eec105cec8daeeb1f5c6411a8089c8dcb0e9ab7747
-
SHA512
e31c408c56dc5cfebb22fbc8ce099aad39443b24db662512aa78592559340cd135b41fb0d877e9afd9894e891cfacf06677d67205e3ebbf02b7fc2b58f71b8cb
-
SSDEEP
24576:oywcSW2S0aebIs6CeGlWUDBsA0YkT4srgED/hdyFXaE5W:vwcSUeUzFGZlIBem/hdydaE
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-