General
-
Target
44e31dbf332ff58555c4b23acfd8b214ea80cd0c283dff13627345dc868693d8
-
Size
1.3MB
-
Sample
231113-fjq72she91
-
MD5
dda59ccce525079ff25c49c12975ee12
-
SHA1
c0cdc7d7fb4d06cadca4e3b6a395c1d55af69aaa
-
SHA256
44e31dbf332ff58555c4b23acfd8b214ea80cd0c283dff13627345dc868693d8
-
SHA512
346f7a75aa353a895e3e3d3a89d7bd5e1713c716c38ff4b56331d6e2294a4a21c9f7b7ee531f1142d4a4bc68d1b0065a7c3ad7fa70df05d33bd30fd4bba2d98c
-
SSDEEP
24576:8ynoqwfSnaekIs3CjGbRDDi9xYgHuOcE52UwUNd9fk7V8dB1BmumCsaq:roq9aeDYWGte9LOE2LUNDfcg1BmuI
Static task
static1
Behavioral task
behavioral1
Sample
44e31dbf332ff58555c4b23acfd8b214ea80cd0c283dff13627345dc868693d8.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
44e31dbf332ff58555c4b23acfd8b214ea80cd0c283dff13627345dc868693d8.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
44e31dbf332ff58555c4b23acfd8b214ea80cd0c283dff13627345dc868693d8
-
Size
1.3MB
-
MD5
dda59ccce525079ff25c49c12975ee12
-
SHA1
c0cdc7d7fb4d06cadca4e3b6a395c1d55af69aaa
-
SHA256
44e31dbf332ff58555c4b23acfd8b214ea80cd0c283dff13627345dc868693d8
-
SHA512
346f7a75aa353a895e3e3d3a89d7bd5e1713c716c38ff4b56331d6e2294a4a21c9f7b7ee531f1142d4a4bc68d1b0065a7c3ad7fa70df05d33bd30fd4bba2d98c
-
SSDEEP
24576:8ynoqwfSnaekIs3CjGbRDDi9xYgHuOcE52UwUNd9fk7V8dB1BmumCsaq:roq9aeDYWGte9LOE2LUNDfcg1BmuI
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-