General
-
Target
08042050f1e655a5f99ae77043d6e0523f57813432f7c1c1a25079b2738857d2
-
Size
1.4MB
-
Sample
231113-cgppnafd8x
-
MD5
9a50024a91926b9b09ee6bd14815f468
-
SHA1
2f763f60a0e205f7c5384c4e8bcd2d028a34b460
-
SHA256
08042050f1e655a5f99ae77043d6e0523f57813432f7c1c1a25079b2738857d2
-
SHA512
da7b418fbc0a89b546ffb435ffda8f2fe4dff6132f77c0d011cba3c8a70bbafe4b7703c9aff1ff38a61c3378370f6fcfc3898fe206bbf07ac3553ca582e319bf
-
SSDEEP
24576:eyN8kt13BOG18egIsW8FGOlJDxon1iTg+DnS6s6N4X3MEMkL/BOCaIu:tN/FqentGG6eAh7tBc6qBOC
Static task
static1
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
smokeloader
up3
Targets
-
-
Target
08042050f1e655a5f99ae77043d6e0523f57813432f7c1c1a25079b2738857d2
-
Size
1.4MB
-
MD5
9a50024a91926b9b09ee6bd14815f468
-
SHA1
2f763f60a0e205f7c5384c4e8bcd2d028a34b460
-
SHA256
08042050f1e655a5f99ae77043d6e0523f57813432f7c1c1a25079b2738857d2
-
SHA512
da7b418fbc0a89b546ffb435ffda8f2fe4dff6132f77c0d011cba3c8a70bbafe4b7703c9aff1ff38a61c3378370f6fcfc3898fe206bbf07ac3553ca582e319bf
-
SSDEEP
24576:eyN8kt13BOG18egIsW8FGOlJDxon1iTg+DnS6s6N4X3MEMkL/BOCaIu:tN/FqentGG6eAh7tBc6qBOC
-
Detect Mystic stealer payload
-
Detect ZGRat V1
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1