General
-
Target
704a65fd9f971fc4ec1d6187b4f8819a49e425e22650438e01ec5906c7df7ea7
-
Size
1.3MB
-
Sample
231113-tqsakseb83
-
MD5
99240fb9c640600a826de415b9ffee34
-
SHA1
4367e339aee8a88b72092d4b99bed1c12749b73a
-
SHA256
704a65fd9f971fc4ec1d6187b4f8819a49e425e22650438e01ec5906c7df7ea7
-
SHA512
fceda08d0387bbe99c31a6ca1ad3a4efeac165073432b1f5d87897c8e548040a8e92fc41ac594ddddbb6400e0c6a7d4864f20713bb1e1a49e7620912ca006aa7
-
SSDEEP
24576:qyNL5qhuvIpaQwKHcqjbCNCSp7qidIQGDacCq0YA2EVjoLbBnAhID9B3:xNL5qIvYJjbAJd/GAYLJJMIDP
Static task
static1
Behavioral task
behavioral1
Sample
704a65fd9f971fc4ec1d6187b4f8819a49e425e22650438e01ec5906c7df7ea7.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
704a65fd9f971fc4ec1d6187b4f8819a49e425e22650438e01ec5906c7df7ea7
-
Size
1.3MB
-
MD5
99240fb9c640600a826de415b9ffee34
-
SHA1
4367e339aee8a88b72092d4b99bed1c12749b73a
-
SHA256
704a65fd9f971fc4ec1d6187b4f8819a49e425e22650438e01ec5906c7df7ea7
-
SHA512
fceda08d0387bbe99c31a6ca1ad3a4efeac165073432b1f5d87897c8e548040a8e92fc41ac594ddddbb6400e0c6a7d4864f20713bb1e1a49e7620912ca006aa7
-
SSDEEP
24576:qyNL5qhuvIpaQwKHcqjbCNCSp7qidIQGDacCq0YA2EVjoLbBnAhID9B3:xNL5qIvYJjbAJd/GAYLJJMIDP
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-