General
-
Target
18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b
-
Size
1.1MB
-
Sample
231113-qbxpzadc38
-
MD5
26a48a9ee2b814fd5f8e2e6ed4383d6b
-
SHA1
3c4537353282ab8346b1bf9baec7ae7c8a483bc5
-
SHA256
18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b
-
SHA512
ead0fb2e9fd205349e36f09bd6c9fb2d5604996fcd9dda19ce85ddc4b05478fb3a84e56d806edb82c04237aa87fb8213cb30060baff309f4be5755ac168658dc
-
SSDEEP
24576:vypN5jo7+oWXcwgPnsgV5nQUFpRC/W/m75hKn310VVLzTwuwHrAfz:6pNmbWXcwgPndxmey/K31mVXkt
Static task
static1
Behavioral task
behavioral1
Sample
18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b
-
Size
1.1MB
-
MD5
26a48a9ee2b814fd5f8e2e6ed4383d6b
-
SHA1
3c4537353282ab8346b1bf9baec7ae7c8a483bc5
-
SHA256
18081fb12014cbf76301fd7613bd52cbb7cf155b70c65cf8c5d886647e35ef6b
-
SHA512
ead0fb2e9fd205349e36f09bd6c9fb2d5604996fcd9dda19ce85ddc4b05478fb3a84e56d806edb82c04237aa87fb8213cb30060baff309f4be5755ac168658dc
-
SSDEEP
24576:vypN5jo7+oWXcwgPnsgV5nQUFpRC/W/m75hKn310VVLzTwuwHrAfz:6pNmbWXcwgPndxmey/K31mVXkt
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1