General
-
Target
7a262ba75256096334d072d20f019c1b970b20715a2ada17c8316812a14a900c
-
Size
887KB
-
Sample
231114-hv8ycahe47
-
MD5
9f6252389357e77883511ad48dababa4
-
SHA1
6593d7efb58d8c534ac67a32f50f50ab1181cdfa
-
SHA256
7a262ba75256096334d072d20f019c1b970b20715a2ada17c8316812a14a900c
-
SHA512
177f46968629d55874e9ef1cad461f402c4a0f42eb8e1fc41ea0098a034077ca7490490276e3fff6839676f95de183d307ab52abe673cfa857e58ffa32bdf75f
-
SSDEEP
24576:7yuU5FK0JQR5YhMG58QjhUsYd+qjkAsa:uuU5F8A58QisWoAs
Static task
static1
Behavioral task
behavioral1
Sample
7a262ba75256096334d072d20f019c1b970b20715a2ada17c8316812a14a900c.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
7a262ba75256096334d072d20f019c1b970b20715a2ada17c8316812a14a900c
-
Size
887KB
-
MD5
9f6252389357e77883511ad48dababa4
-
SHA1
6593d7efb58d8c534ac67a32f50f50ab1181cdfa
-
SHA256
7a262ba75256096334d072d20f019c1b970b20715a2ada17c8316812a14a900c
-
SHA512
177f46968629d55874e9ef1cad461f402c4a0f42eb8e1fc41ea0098a034077ca7490490276e3fff6839676f95de183d307ab52abe673cfa857e58ffa32bdf75f
-
SSDEEP
24576:7yuU5FK0JQR5YhMG58QjhUsYd+qjkAsa:uuU5F8A58QisWoAs
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-