General
-
Target
6a73599227e89d1b5d677a38bb8a55bf83444df22bd7231474c08a09058ec5d4
-
Size
888KB
-
Sample
231114-latvgaad4s
-
MD5
c9a81773fe199836f9319be0af18e3ff
-
SHA1
5facafab3a75b840ba5fa7ed5bc1f3f1088fed06
-
SHA256
6a73599227e89d1b5d677a38bb8a55bf83444df22bd7231474c08a09058ec5d4
-
SHA512
4884d21ab3d4cf133c7c5eac75877aac925f28347b7ea621608f77d1b87e58ea9cf54f52b5260c526fca7e0e5f55d028e31ba06aca46c85de21403bc42eeed7b
-
SSDEEP
12288:2Mrxy90LQSoUmANoeQAgay13MYj7Mwy3ZRR82CPgDAQ3AMa9bco+/q9i5wokQ:XycpGrAwtMWMLKsAuAMmbI
Static task
static1
Behavioral task
behavioral1
Sample
6a73599227e89d1b5d677a38bb8a55bf83444df22bd7231474c08a09058ec5d4.exe
Resource
win10-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
6a73599227e89d1b5d677a38bb8a55bf83444df22bd7231474c08a09058ec5d4
-
Size
888KB
-
MD5
c9a81773fe199836f9319be0af18e3ff
-
SHA1
5facafab3a75b840ba5fa7ed5bc1f3f1088fed06
-
SHA256
6a73599227e89d1b5d677a38bb8a55bf83444df22bd7231474c08a09058ec5d4
-
SHA512
4884d21ab3d4cf133c7c5eac75877aac925f28347b7ea621608f77d1b87e58ea9cf54f52b5260c526fca7e0e5f55d028e31ba06aca46c85de21403bc42eeed7b
-
SSDEEP
12288:2Mrxy90LQSoUmANoeQAgay13MYj7Mwy3ZRR82CPgDAQ3AMa9bco+/q9i5wokQ:XycpGrAwtMWMLKsAuAMmbI
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-