General
-
Target
3aa760f9a4f0d96deb9e6e8bc4d253e765f29b55efb2e8e1902e9675643b1cd4
-
Size
917KB
-
Sample
231113-ffgt7she4z
-
MD5
0e4b3fc436a40ea1d3401f75d1721d9e
-
SHA1
53ab8b6ca7a7ebed9ebcbfce3793982f915f44b3
-
SHA256
3aa760f9a4f0d96deb9e6e8bc4d253e765f29b55efb2e8e1902e9675643b1cd4
-
SHA512
b26e566e76df8c650bb73f75e2f492de57b36472528b41d22e5ea055c29e5b86af6a9e2d0b830cd56b9011d2b9e70bb735f390a8356dabf282a5a5e57ba7012f
-
SSDEEP
24576:8yymoEsGnUaeuIsCC/G1LYDYyRawHNuG/Q:r/oEfNettEGOPoSNn
Static task
static1
Behavioral task
behavioral1
Sample
3aa760f9a4f0d96deb9e6e8bc4d253e765f29b55efb2e8e1902e9675643b1cd4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3aa760f9a4f0d96deb9e6e8bc4d253e765f29b55efb2e8e1902e9675643b1cd4.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
3aa760f9a4f0d96deb9e6e8bc4d253e765f29b55efb2e8e1902e9675643b1cd4
-
Size
917KB
-
MD5
0e4b3fc436a40ea1d3401f75d1721d9e
-
SHA1
53ab8b6ca7a7ebed9ebcbfce3793982f915f44b3
-
SHA256
3aa760f9a4f0d96deb9e6e8bc4d253e765f29b55efb2e8e1902e9675643b1cd4
-
SHA512
b26e566e76df8c650bb73f75e2f492de57b36472528b41d22e5ea055c29e5b86af6a9e2d0b830cd56b9011d2b9e70bb735f390a8356dabf282a5a5e57ba7012f
-
SSDEEP
24576:8yymoEsGnUaeuIsCC/G1LYDYyRawHNuG/Q:r/oEfNettEGOPoSNn
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-