General
-
Target
Az9CT03.exe
-
Size
877KB
-
Sample
231113-lldmmabh4z
-
MD5
f7793cf4ad987b0a3ff0b6fdb1f31b65
-
SHA1
44594ab3697e1102b514ca209c8d8e0db30011a3
-
SHA256
ac699c44b77a5a915ba4cd74689097a676126775e565a8b940b3634bdacae3cc
-
SHA512
09d592b2c08369f92f0ce0049356316a5c23dc89664349729531dcf595deadaf2ca83bcb1e0b882df2049c7ae24822343873c11828715c711543ad3d27ab766a
-
SSDEEP
24576:cyoKEtJaeUIsACtG0PYDzavtXRJIUrvlQf:LqtkezziG7XavtXR/S
Static task
static1
Behavioral task
behavioral1
Sample
Az9CT03.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Az9CT03.exe
Resource
win10-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
Az9CT03.exe
-
Size
877KB
-
MD5
f7793cf4ad987b0a3ff0b6fdb1f31b65
-
SHA1
44594ab3697e1102b514ca209c8d8e0db30011a3
-
SHA256
ac699c44b77a5a915ba4cd74689097a676126775e565a8b940b3634bdacae3cc
-
SHA512
09d592b2c08369f92f0ce0049356316a5c23dc89664349729531dcf595deadaf2ca83bcb1e0b882df2049c7ae24822343873c11828715c711543ad3d27ab766a
-
SSDEEP
24576:cyoKEtJaeUIsACtG0PYDzavtXRJIUrvlQf:LqtkezziG7XavtXR/S
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-