General
-
Target
02b9093c16847b5c5928b641cfacb073a2139801590bde64fc945c56abfabaee
-
Size
891KB
-
Sample
231113-zlm3ysfe29
-
MD5
a4643a016d6924cdce59ad62e2149b91
-
SHA1
fb569ce3db9811f42cfc97bf1489c262c5aabda5
-
SHA256
02b9093c16847b5c5928b641cfacb073a2139801590bde64fc945c56abfabaee
-
SHA512
f6751610b4bb90b9eb816b29e9d5b117de1ef2b78559d32f7dffe1e13529b2ac42d155a75fe5969ad2be0b44c2f83e96a8622898b468f218990a64470e4284a1
-
SSDEEP
24576:8yl3ZmRr10SPdyacBuHmyfG9fMhUlgQE:rvs6SFyacCGCK
Static task
static1
Behavioral task
behavioral1
Sample
02b9093c16847b5c5928b641cfacb073a2139801590bde64fc945c56abfabaee.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
02b9093c16847b5c5928b641cfacb073a2139801590bde64fc945c56abfabaee
-
Size
891KB
-
MD5
a4643a016d6924cdce59ad62e2149b91
-
SHA1
fb569ce3db9811f42cfc97bf1489c262c5aabda5
-
SHA256
02b9093c16847b5c5928b641cfacb073a2139801590bde64fc945c56abfabaee
-
SHA512
f6751610b4bb90b9eb816b29e9d5b117de1ef2b78559d32f7dffe1e13529b2ac42d155a75fe5969ad2be0b44c2f83e96a8622898b468f218990a64470e4284a1
-
SSDEEP
24576:8yl3ZmRr10SPdyacBuHmyfG9fMhUlgQE:rvs6SFyacCGCK
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-