General
-
Target
5e58c7210f9f0753d651e7207240e728.bin
-
Size
1.2MB
-
Sample
231113-cfd7jafd7v
-
MD5
1328955bbab3d3a1506ac32c40e27e55
-
SHA1
8405e9b3a689af9761652ef6eb9c12f94f5529a3
-
SHA256
8e3c749de675b1ca65114a10e322ce50d99b41a133d4da333915f5c6d4649bc7
-
SHA512
082ac51f6f8a6680d6ca619d6671203bc1ee00a0a0335192bb7dd4f74bee3dced3c784a2528b62fca88b290e7ac510ccfb6d15673249a79fa366d6ea700e7f05
-
SSDEEP
24576:NUbucwqqHbcpsBeWMQV9lSpqHqp+QT7V1JAZbU3YCoZMNTjc+YkJJSpv:iucwqwbcpsBeWMq43JSFZkjcxkJJ0v
Static task
static1
Behavioral task
behavioral1
Sample
6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac.exe
-
Size
1.3MB
-
MD5
5e58c7210f9f0753d651e7207240e728
-
SHA1
31b5afd364f5a2ead3433048ee999decf634b12b
-
SHA256
6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac
-
SHA512
d5a3e34e5e83b2022f370f1e7431a32e988d67162b30d7bb23d4f347a501c3eb8f6dcc6d094f58d87d277bb3a609a6cd8af614c64acffa2989314f692d9eaac6
-
SSDEEP
24576:2y15jmqo3i96mFae1IsOC0GjShD1IKAKqfV7qYJ0nK8pF9zhfNvK:F15jm9e6xe2jfGiiKte7Fend1
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-