General
-
Target
93de95190406d77bed0efceb4c1dbf43.bin
-
Size
1.2MB
-
Sample
231113-czhn3afg2t
-
MD5
3fe653c40aa136eb666792af9db38c1e
-
SHA1
b96ce90e7abf71699ba8da62125c33a3bb45c824
-
SHA256
2b0acdbf39b7e97e5742c3a28ae1b16214909f4e60025bc958095a90d91a251f
-
SHA512
43dd9c602594c3132d6bb87a7e3d3f08f7132263647d710cc746614ec1903d3677518901d327b39520a47dba72bfe4463c85a0661d181548ee642bd159544d2f
-
SSDEEP
24576:XG98zzLGGbADBFlloUxw78qXXXyCVFj6jOIH/lZzgpmt7mRt0pZeKJpjLf5FTK:298znZbADlO4CTSCXj6jRfmspAIJO
Static task
static1
Behavioral task
behavioral1
Sample
134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6.exe
-
Size
1.3MB
-
MD5
93de95190406d77bed0efceb4c1dbf43
-
SHA1
4e355c118045771a2cc90272482fbc446d338a5c
-
SHA256
134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6
-
SHA512
8758327f924787878295fe97d7213071c470bd2454a7241c79f126cbfe8a553da1fc5dc10761fe76b36282a4de9def6e5703181d9f62c0769e4dd60101e932c5
-
SSDEEP
24576:uyYUHIfgZI9faepIstCiGldXD69ya6k6tGQtjZBSBgz5d:9Y0IfbCeS0LGP+UGQxZoBa5
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-