General
-
Target
896200690a2a6ace88febc8b4ecb59f7.bin
-
Size
329KB
-
Sample
231114-crvzesge88
-
MD5
7a7a4a844c01445f94a8689bee6a903c
-
SHA1
55ba3a55d1eb9a3dffd7e603b2ca841f22b0e22a
-
SHA256
5f91d6c7801f696f48229bca55617d78a3bed1fec03801148bd6cf8b01b9e53c
-
SHA512
ca29c06668da406476ba02b3154cf688ffe2b9e6d718e0aca4f0722e7b3b3eef225bb20ec44748c62b163676a2a791a1d190c93c400bea8e287a3c30cdaea3c6
-
SSDEEP
6144:YMANk3VCrE4yiF8RprbHXx3jBjLeWwVQa9Sky3ppyvDi1Ozo4GIV6jUFyjnQEW:YMC4SB/y3h1jkQa9p8N1kPvEFjnQEW
Static task
static1
Behavioral task
behavioral1
Sample
c05591f745cbabd44158ae3823bb58f230c0d8acb2210502d626e1724265d0b7.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
c05591f745cbabd44158ae3823bb58f230c0d8acb2210502d626e1724265d0b7.exe
-
Size
373KB
-
MD5
896200690a2a6ace88febc8b4ecb59f7
-
SHA1
d3eb645567d656612bf76cd42a510bbd5fa8196b
-
SHA256
c05591f745cbabd44158ae3823bb58f230c0d8acb2210502d626e1724265d0b7
-
SHA512
dad6d27cc465d112d5e8dd4ac2f1ae20e20ac474b33088945207084586173dd8a270647352850b121c2168f116845a343be314ce5f088c4308aa9809bae373e3
-
SSDEEP
6144:K3y+bnr+Vp0yN90QEEsrTqIhsgUGsz7ceTP7qvH84+IgRq9EoDCKff5KJSP9jF2y:NMrxy90zlhlUJzXiU4+LqlewP2LO
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-