General
-
Target
2a85d1a473a3fbb974494144368b590ea0238e4032957055b9a44f9c374330f6
-
Size
789KB
-
Sample
231113-r3x1gsde89
-
MD5
ba10ad2c675635b1d54c846295c791e3
-
SHA1
c98d5a06ab023583b290086a8d461c538c7a7323
-
SHA256
2a85d1a473a3fbb974494144368b590ea0238e4032957055b9a44f9c374330f6
-
SHA512
ef1ebbbabe7dd67ae1161f001c51643dd38d379ea9949d7198e5ae297d57eb9eb69e06f1a3a6beec5173971fe0ceaca3bc68d85d51e8d7c5da2f450bee8a574c
-
SSDEEP
24576:Fy+KV5NPnnzVIjoE7dA4+plj7F8dF3LiBcd5yjU:g+sLnnzVBE7dA4+pFw3qci
Static task
static1
Behavioral task
behavioral1
Sample
2a85d1a473a3fbb974494144368b590ea0238e4032957055b9a44f9c374330f6.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
2a85d1a473a3fbb974494144368b590ea0238e4032957055b9a44f9c374330f6
-
Size
789KB
-
MD5
ba10ad2c675635b1d54c846295c791e3
-
SHA1
c98d5a06ab023583b290086a8d461c538c7a7323
-
SHA256
2a85d1a473a3fbb974494144368b590ea0238e4032957055b9a44f9c374330f6
-
SHA512
ef1ebbbabe7dd67ae1161f001c51643dd38d379ea9949d7198e5ae297d57eb9eb69e06f1a3a6beec5173971fe0ceaca3bc68d85d51e8d7c5da2f450bee8a574c
-
SSDEEP
24576:Fy+KV5NPnnzVIjoE7dA4+plj7F8dF3LiBcd5yjU:g+sLnnzVBE7dA4+pFw3qci
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-