General
-
Target
NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe
-
Size
1.4MB
-
Sample
231115-s2svtabg43
-
MD5
d7330b5bf5d11776b9e85f164ed4dbac
-
SHA1
015c901c53b25b57dcc87b3717ee551bc8e20d77
-
SHA256
c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14
-
SHA512
b4298c4011a35302d7ead43d579244983ec644f41a012edf2264003e4faed2f17794853c4b17788ce4bac57bbd4dfa59736a09134819361742337cce7b783e4f
-
SSDEEP
24576:vy4U3y8WzlCuqdxiatvvNgx9S7cceR3JYeLZk7dLdAgPe5shtj5uTmBeiz:64aazUuUiat3FwZ9vdkFOg/tluT+ei
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Extracted
risepro
5.42.92.51
Targets
-
-
Target
NEAS.c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14.exe
-
Size
1.4MB
-
MD5
d7330b5bf5d11776b9e85f164ed4dbac
-
SHA1
015c901c53b25b57dcc87b3717ee551bc8e20d77
-
SHA256
c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14
-
SHA512
b4298c4011a35302d7ead43d579244983ec644f41a012edf2264003e4faed2f17794853c4b17788ce4bac57bbd4dfa59736a09134819361742337cce7b783e4f
-
SSDEEP
24576:vy4U3y8WzlCuqdxiatvvNgx9S7cceR3JYeLZk7dLdAgPe5shtj5uTmBeiz:64aazUuUiat3FwZ9vdkFOg/tluT+ei
-
Detect Mystic stealer payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Enumerates VirtualBox registry keys
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-