General
-
Target
c0aa8aafb0b69a184b128bb4ec669b08970553647ae9d3741da511beb938c391
-
Size
894KB
-
Sample
231114-dal6magb4x
-
MD5
28bf6d7dfb8cd9da7db94b2628f94230
-
SHA1
5880277376b15b2fbf221451487bf62f2907adeb
-
SHA256
c0aa8aafb0b69a184b128bb4ec669b08970553647ae9d3741da511beb938c391
-
SHA512
6443b0f0fc2ff60077b8d974d869006f32e5c8860dc3960c758cd6b3d0487151df02495a84a10abd1a60b631a808e1d9af224efe1808a6165c435dc5be8df2ef
-
SSDEEP
24576:Gytn4iDgakf7DDEpMmA59Fg8l2FZ7OF0fp4MGRVRlC:VeQgd7DgpMmAoZzh4MGFl
Static task
static1
Behavioral task
behavioral1
Sample
c0aa8aafb0b69a184b128bb4ec669b08970553647ae9d3741da511beb938c391.exe
Resource
win10-20231023-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
c0aa8aafb0b69a184b128bb4ec669b08970553647ae9d3741da511beb938c391
-
Size
894KB
-
MD5
28bf6d7dfb8cd9da7db94b2628f94230
-
SHA1
5880277376b15b2fbf221451487bf62f2907adeb
-
SHA256
c0aa8aafb0b69a184b128bb4ec669b08970553647ae9d3741da511beb938c391
-
SHA512
6443b0f0fc2ff60077b8d974d869006f32e5c8860dc3960c758cd6b3d0487151df02495a84a10abd1a60b631a808e1d9af224efe1808a6165c435dc5be8df2ef
-
SSDEEP
24576:Gytn4iDgakf7DDEpMmA59Fg8l2FZ7OF0fp4MGRVRlC:VeQgd7DgpMmAoZzh4MGFl
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-