General
-
Target
AH1hX64.exe
-
Size
878KB
-
Sample
231113-lnaczscd22
-
MD5
dedddeded05c0ae3ab4c5888e292e60b
-
SHA1
1ca18d5319626dec7d291563c6624b018b4e0644
-
SHA256
41c9d672d16a1844e6383a3599b3198adc2e7dca4d66da4b109969dc9a0b4864
-
SHA512
b2e1872cfc57791f2e5405920c93a3a6afded367c508cbc87d0c1fcadf02e529251e862dfe99027beae89706a4f74c9664f05dcdb10c419847a9d3f2610980d4
-
SSDEEP
12288:zMrwy90kf7o6/T4WX+3Cpxgae74IC5MpClHGg1PLvXMXiYQmD6AuxLvCWGclwxOV:Xy9HtUegaeUIsICtGIPYD4LXz
Static task
static1
Behavioral task
behavioral1
Sample
AH1hX64.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
AH1hX64.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
AH1hX64.exe
-
Size
878KB
-
MD5
dedddeded05c0ae3ab4c5888e292e60b
-
SHA1
1ca18d5319626dec7d291563c6624b018b4e0644
-
SHA256
41c9d672d16a1844e6383a3599b3198adc2e7dca4d66da4b109969dc9a0b4864
-
SHA512
b2e1872cfc57791f2e5405920c93a3a6afded367c508cbc87d0c1fcadf02e529251e862dfe99027beae89706a4f74c9664f05dcdb10c419847a9d3f2610980d4
-
SSDEEP
12288:zMrwy90kf7o6/T4WX+3Cpxgae74IC5MpClHGg1PLvXMXiYQmD6AuxLvCWGclwxOV:Xy9HtUegaeUIsICtGIPYD4LXz
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-