General

  • Target

    NEAS.35519396c3f6f09fb10973923cabe3a8a28b9339cc846b72bb85f36ce8852b3a.exe

  • Size

    511KB

  • Sample

    231111-l6d4wseb54

  • MD5

    db1259b1ce3a588a3b3ac6f44ae3bb2e

  • SHA1

    f02b3b97409ee639e85018d13eba138ab8fedefb

  • SHA256

    35519396c3f6f09fb10973923cabe3a8a28b9339cc846b72bb85f36ce8852b3a

  • SHA512

    7dcaceb476a5fe517ed3c111147d581eba01f9057d4cb31ef7f5b904cf2ce6d8a53c0e02aa5272e23f9df4bf5a7b0f2a71fdc03a84c7b9c05fb442214180fe4f

  • SSDEEP

    12288:SMr9y90Tc0i/V90LxwpW8Y8TUs2MuX+4+wSR9FCV9f8XOT:Xy0Nl8YSz2MuuUS3af9

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.35519396c3f6f09fb10973923cabe3a8a28b9339cc846b72bb85f36ce8852b3a.exe

    • Size

      511KB

    • MD5

      db1259b1ce3a588a3b3ac6f44ae3bb2e

    • SHA1

      f02b3b97409ee639e85018d13eba138ab8fedefb

    • SHA256

      35519396c3f6f09fb10973923cabe3a8a28b9339cc846b72bb85f36ce8852b3a

    • SHA512

      7dcaceb476a5fe517ed3c111147d581eba01f9057d4cb31ef7f5b904cf2ce6d8a53c0e02aa5272e23f9df4bf5a7b0f2a71fdc03a84c7b9c05fb442214180fe4f

    • SSDEEP

      12288:SMr9y90Tc0i/V90LxwpW8Y8TUs2MuX+4+wSR9FCV9f8XOT:Xy0Nl8YSz2MuuUS3af9

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks