General
-
Target
48922a35a5ba37dddca84adc818fd762daa91a670a478d00e09f6a738750595d
-
Size
881KB
-
Sample
231113-xv9l7see8s
-
MD5
98899f22a10c280312fe8d19237f6f18
-
SHA1
12e758b38967e2a89d3378645eb5a97d6f6bc84c
-
SHA256
48922a35a5ba37dddca84adc818fd762daa91a670a478d00e09f6a738750595d
-
SHA512
e3222dd3916bb1f6ace61ac886be0566babdc09b63604f2052b492554f602ec0268737c49cd3ab655094f0fde80824e12f93d20daf722a972967565dd53f94b9
-
SSDEEP
12288:RMrcy90U5MBk0fpdMlHOX7FVrNOnu0D6M1wsog2uLvEVktUbuMQrTy1ZvX2p:Ny5sfMlo7nEvB8ju5y1Z/A
Static task
static1
Behavioral task
behavioral1
Sample
48922a35a5ba37dddca84adc818fd762daa91a670a478d00e09f6a738750595d.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
48922a35a5ba37dddca84adc818fd762daa91a670a478d00e09f6a738750595d
-
Size
881KB
-
MD5
98899f22a10c280312fe8d19237f6f18
-
SHA1
12e758b38967e2a89d3378645eb5a97d6f6bc84c
-
SHA256
48922a35a5ba37dddca84adc818fd762daa91a670a478d00e09f6a738750595d
-
SHA512
e3222dd3916bb1f6ace61ac886be0566babdc09b63604f2052b492554f602ec0268737c49cd3ab655094f0fde80824e12f93d20daf722a972967565dd53f94b9
-
SSDEEP
12288:RMrcy90U5MBk0fpdMlHOX7FVrNOnu0D6M1wsog2uLvEVktUbuMQrTy1ZvX2p:Ny5sfMlo7nEvB8ju5y1Z/A
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-