General
-
Target
1947b4931f55d003a5a021b1ffd0eb61.exe
-
Size
1.3MB
-
Sample
231113-nnad4acg93
-
MD5
1947b4931f55d003a5a021b1ffd0eb61
-
SHA1
a063a82db284f64d1a9f67fd49102e42a7ef44f7
-
SHA256
6172161109f5b9a4e9f185740e88a6378b18f41121c687455f2dc9be1b86ab01
-
SHA512
bb533ffeaf910c8bc1f38914e3a637142741ee3567125d4a69308038901d640de55cf49a2294287ebde9d2c561eac8fd0fd294f6558fb3b95b4bc4e7e7685635
-
SSDEEP
24576:YyxKh6dc+e3b6xaeTIsKCuGG49DuWvlNnr7knfa2BAU5S04ZQ1ZPX6occ:fM6e+e3Ze8hrGJSWvl97LBv04ZcB/
Static task
static1
Behavioral task
behavioral1
Sample
1947b4931f55d003a5a021b1ffd0eb61.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
1947b4931f55d003a5a021b1ffd0eb61.exe
-
Size
1.3MB
-
MD5
1947b4931f55d003a5a021b1ffd0eb61
-
SHA1
a063a82db284f64d1a9f67fd49102e42a7ef44f7
-
SHA256
6172161109f5b9a4e9f185740e88a6378b18f41121c687455f2dc9be1b86ab01
-
SHA512
bb533ffeaf910c8bc1f38914e3a637142741ee3567125d4a69308038901d640de55cf49a2294287ebde9d2c561eac8fd0fd294f6558fb3b95b4bc4e7e7685635
-
SSDEEP
24576:YyxKh6dc+e3b6xaeTIsKCuGG49DuWvlNnr7knfa2BAU5S04ZQ1ZPX6occ:fM6e+e3Ze8hrGJSWvl97LBv04ZcB/
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-