General
-
Target
NEAS.1a467bd24fa9f0b1cfa4b09a307e94f0.exe
-
Size
917KB
-
Sample
231118-gy6fyscb95
-
MD5
1a467bd24fa9f0b1cfa4b09a307e94f0
-
SHA1
b70c74658a76076ac848010797cf763014649f29
-
SHA256
736ff56eadeca8ef55285e2a219a684d2b147a8a1ee49871a2b1c151d731a492
-
SHA512
74a9d69a4d20f77894fc67add81f2f56837194681de506026ec85eee0e486fe8725053d2ef08efa2f49dbfb6f74d887391fea855b940480637fec90c2b0494ed
-
SSDEEP
24576:qyr806WLaeuIsCC/G3LYDz5zdc/0dvzE8V:xMzetlEGcPcazE8
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1a467bd24fa9f0b1cfa4b09a307e94f0.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
NEAS.1a467bd24fa9f0b1cfa4b09a307e94f0.exe
-
Size
917KB
-
MD5
1a467bd24fa9f0b1cfa4b09a307e94f0
-
SHA1
b70c74658a76076ac848010797cf763014649f29
-
SHA256
736ff56eadeca8ef55285e2a219a684d2b147a8a1ee49871a2b1c151d731a492
-
SHA512
74a9d69a4d20f77894fc67add81f2f56837194681de506026ec85eee0e486fe8725053d2ef08efa2f49dbfb6f74d887391fea855b940480637fec90c2b0494ed
-
SSDEEP
24576:qyr806WLaeuIsCC/G3LYDz5zdc/0dvzE8V:xMzetlEGcPcazE8
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-