General
-
Target
bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4
-
Size
917KB
-
Sample
231113-le61lacc33
-
MD5
896f79811e26b6cef2d52f2d0fbdd3be
-
SHA1
07905fc9177ca3cdd0a6cc85c6506a6bc50f6108
-
SHA256
bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4
-
SHA512
3260ad539ccca98365ce4a261b59e759d77270087fd5160e1401d7513ac498d9acdc4b445e52e25876aa7f75e29939645bd50570bcd978bd19eabb0276334a38
-
SSDEEP
24576:hyUAMiX50aeuIs6C/GVLYDpRSdi4/p+dT2D:UrtetjEGuFRcp+d
Static task
static1
Behavioral task
behavioral1
Sample
bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4.exe
Resource
win10-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4
-
Size
917KB
-
MD5
896f79811e26b6cef2d52f2d0fbdd3be
-
SHA1
07905fc9177ca3cdd0a6cc85c6506a6bc50f6108
-
SHA256
bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4
-
SHA512
3260ad539ccca98365ce4a261b59e759d77270087fd5160e1401d7513ac498d9acdc4b445e52e25876aa7f75e29939645bd50570bcd978bd19eabb0276334a38
-
SSDEEP
24576:hyUAMiX50aeuIs6C/GVLYDpRSdi4/p+dT2D:UrtetjEGuFRcp+d
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-