General
-
Target
26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29
-
Size
1.3MB
-
Sample
231113-xgke6aee4v
-
MD5
b3db26e05fef02e0d0e5ef1de7a4b57b
-
SHA1
b77605380920624d2fc77c934c5c148abfe5e580
-
SHA256
26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29
-
SHA512
ab5fc82d966fb6153b73aa5da2551a54d4361106710660abcf4de8a9b5f8f9b4d214bf43e74c2111053fa73c08bc024cc7819b73b32eca6543c2a42492218fff
-
SSDEEP
24576:Hy275jdzF5b0xaSXKjri9m5yLMGk+I+oqB0/uZsixC0:S275jdznb0xPXKjv5ygGDBW41
Static task
static1
Behavioral task
behavioral1
Sample
26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29
-
Size
1.3MB
-
MD5
b3db26e05fef02e0d0e5ef1de7a4b57b
-
SHA1
b77605380920624d2fc77c934c5c148abfe5e580
-
SHA256
26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29
-
SHA512
ab5fc82d966fb6153b73aa5da2551a54d4361106710660abcf4de8a9b5f8f9b4d214bf43e74c2111053fa73c08bc024cc7819b73b32eca6543c2a42492218fff
-
SSDEEP
24576:Hy275jdzF5b0xaSXKjri9m5yLMGk+I+oqB0/uZsixC0:S275jdznb0xPXKjv5ygGDBW41
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-