General
-
Target
b9bfedc0928aa0fd6f11d9d21d7d37dd631b1bd0f2516c41b48ab6e0de19894f
-
Size
1.3MB
-
Sample
231113-le5sjacc32
-
MD5
86f2549e1d0437b8973796eb73730070
-
SHA1
c9a65c88a02a43878e0e48ca3e40bf5b98d66c8d
-
SHA256
b9bfedc0928aa0fd6f11d9d21d7d37dd631b1bd0f2516c41b48ab6e0de19894f
-
SHA512
570df530a3b34bb4d558340f13fc92edd67f2323807c9bc756636d2a0fd9253474396f5380f808e4aecb00382a36ee6fffef693167af62e93760765b9e1a6205
-
SSDEEP
24576:zyWf4UB0L2+9xaenIs5C3G4V7DD8Xw4oqAln+H1AEZ+gI0/Hl:GWffdeIyaGynz4oZuAEDI0/
Static task
static1
Behavioral task
behavioral1
Sample
b9bfedc0928aa0fd6f11d9d21d7d37dd631b1bd0f2516c41b48ab6e0de19894f.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
b9bfedc0928aa0fd6f11d9d21d7d37dd631b1bd0f2516c41b48ab6e0de19894f.exe
Resource
win10-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
b9bfedc0928aa0fd6f11d9d21d7d37dd631b1bd0f2516c41b48ab6e0de19894f
-
Size
1.3MB
-
MD5
86f2549e1d0437b8973796eb73730070
-
SHA1
c9a65c88a02a43878e0e48ca3e40bf5b98d66c8d
-
SHA256
b9bfedc0928aa0fd6f11d9d21d7d37dd631b1bd0f2516c41b48ab6e0de19894f
-
SHA512
570df530a3b34bb4d558340f13fc92edd67f2323807c9bc756636d2a0fd9253474396f5380f808e4aecb00382a36ee6fffef693167af62e93760765b9e1a6205
-
SSDEEP
24576:zyWf4UB0L2+9xaenIs5C3G4V7DD8Xw4oqAln+H1AEZ+gI0/Hl:GWffdeIyaGynz4oZuAEDI0/
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-