General
-
Target
94872dd4149a32ad0df4f44d402bd271.bin
-
Size
1.2MB
-
Sample
231113-czp35sfg3s
-
MD5
ef98aad55c6187ed209dd60f68333139
-
SHA1
fc73210a246377285c2157515d1d817af3159ab2
-
SHA256
fe4730db71ed4459e549bd9f9176efd41bcc3774711e21f4b1cd5cd34167640f
-
SHA512
30fd2b9bd2d83dc514cde24761e42156057719493d7b0b8aed77a1dd9139de5c7f7827d0c4ba98cc9d92b309313b512ad43af63932552a3e2f5783715b348fa6
-
SSDEEP
24576:XNJYpK+cx9TV/K/OniZpJIIVJFLWOzp1mkc+j+yUzKXkr:X0pKxVi0YJIRAmkcA+lKXa
Static task
static1
Behavioral task
behavioral1
Sample
e9ac578be907dd8620c4f07a14093563ea4fb9b43d0342547ffdc9ff9d7ffe98.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
e9ac578be907dd8620c4f07a14093563ea4fb9b43d0342547ffdc9ff9d7ffe98.exe
-
Size
1.3MB
-
MD5
94872dd4149a32ad0df4f44d402bd271
-
SHA1
2db1f1f7631931948c4a3c92684548fb36820b78
-
SHA256
e9ac578be907dd8620c4f07a14093563ea4fb9b43d0342547ffdc9ff9d7ffe98
-
SHA512
e08b7c427fb1ec178ec6d510a63e83f4b8620e5506c07aa162fbdcf907973f9889057936fc015d126c323bbf14163e15530f5fb76a227e9a5f1f23442b9dc497
-
SSDEEP
24576:PyexWG+JvXPLaeaIscCEGXVtDOUoqUMVhXe0xYkqinp0rMiXkYDEy:aexWGAfOehLZGHydtyhnxSWyrMq
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-