General
-
Target
523ddee33670aeac4b7a2f5124bdc7f4aad7adca3d61457bd8eede5be07295c4
-
Size
917KB
-
Sample
231113-j2vjzabg93
-
MD5
2b76bb167fa35ebcbe113bfb03f110a7
-
SHA1
2dc452e3c1ed487ffd656612a0ecba405f76893f
-
SHA256
523ddee33670aeac4b7a2f5124bdc7f4aad7adca3d61457bd8eede5be07295c4
-
SHA512
e4bde83d32e386127d6e6ba67ab092a14aaf8eb434d920fc9f33d040a84ef3ba65245350238f7979af3ff2c8d9fee52f5b43328b40744cc114c26c0a8b2540d7
-
SSDEEP
24576:kykt5kaeuIs6C/GFLYDXu0MreJ9I8Gcn+iU:zsdettEG+hMreJW8GO+i
Static task
static1
Behavioral task
behavioral1
Sample
523ddee33670aeac4b7a2f5124bdc7f4aad7adca3d61457bd8eede5be07295c4.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
523ddee33670aeac4b7a2f5124bdc7f4aad7adca3d61457bd8eede5be07295c4.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
523ddee33670aeac4b7a2f5124bdc7f4aad7adca3d61457bd8eede5be07295c4
-
Size
917KB
-
MD5
2b76bb167fa35ebcbe113bfb03f110a7
-
SHA1
2dc452e3c1ed487ffd656612a0ecba405f76893f
-
SHA256
523ddee33670aeac4b7a2f5124bdc7f4aad7adca3d61457bd8eede5be07295c4
-
SHA512
e4bde83d32e386127d6e6ba67ab092a14aaf8eb434d920fc9f33d040a84ef3ba65245350238f7979af3ff2c8d9fee52f5b43328b40744cc114c26c0a8b2540d7
-
SSDEEP
24576:kykt5kaeuIs6C/GFLYDXu0MreJ9I8Gcn+iU:zsdettEG+hMreJW8GO+i
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-