General
-
Target
999de58f75aa7b5bf23692a429c0edf590719f4a58ace16d057f9a871946ba4e
-
Size
894KB
-
Sample
231114-bqeqdagd25
-
MD5
a987c8d828f7ce0a99a246aea6fcdcc0
-
SHA1
8e28268f4b1c09418b7cddb03eab412ac04b286b
-
SHA256
999de58f75aa7b5bf23692a429c0edf590719f4a58ace16d057f9a871946ba4e
-
SHA512
328c9d1b597b72250a8a020285f30e69c7e3cb5cb6e40e48ffb2ca07918c62390324609e0d223ed4c6d88838936daf42715d9069d84709bca4c155557117c751
-
SSDEEP
24576:ByVUJKu14qC8qxGKd8xmvhAvMYry/uxmLD/5XwhBPe:0ypVaGvmvhAPrAn/5XwDP
Static task
static1
Behavioral task
behavioral1
Sample
999de58f75aa7b5bf23692a429c0edf590719f4a58ace16d057f9a871946ba4e.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
999de58f75aa7b5bf23692a429c0edf590719f4a58ace16d057f9a871946ba4e
-
Size
894KB
-
MD5
a987c8d828f7ce0a99a246aea6fcdcc0
-
SHA1
8e28268f4b1c09418b7cddb03eab412ac04b286b
-
SHA256
999de58f75aa7b5bf23692a429c0edf590719f4a58ace16d057f9a871946ba4e
-
SHA512
328c9d1b597b72250a8a020285f30e69c7e3cb5cb6e40e48ffb2ca07918c62390324609e0d223ed4c6d88838936daf42715d9069d84709bca4c155557117c751
-
SSDEEP
24576:ByVUJKu14qC8qxGKd8xmvhAvMYry/uxmLD/5XwhBPe:0ypVaGvmvhAPrAn/5XwDP
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-