General

  • Target

    NEAS.a468d20f44f8ce7976d9988f72aa2f8aec002ce9c60d1ca3540dc1b3194c4d98.exe

  • Size

    511KB

  • Sample

    231111-mjbwpaee23

  • MD5

    d5c2e053a1e27d60ee24b1cb4aef5129

  • SHA1

    b13a4ae46c177d2e467f92e7ea5966b668da7ca7

  • SHA256

    a468d20f44f8ce7976d9988f72aa2f8aec002ce9c60d1ca3540dc1b3194c4d98

  • SHA512

    90d5fd5e3a46a800368c6a61af21ed93025e193971c050187d7941a5ff0b1a98e9149cab12bf83024bf0cb888a0c61acfc26498983ee9e894638d5d3d704de34

  • SSDEEP

    12288:1MrHy90q2/DWHvqP+wcWM6L+yY8TUs2Cux+4+wSRCFOnfGiULha:WyeSveeWn3YSz2CuEUSoM+ih

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.a468d20f44f8ce7976d9988f72aa2f8aec002ce9c60d1ca3540dc1b3194c4d98.exe

    • Size

      511KB

    • MD5

      d5c2e053a1e27d60ee24b1cb4aef5129

    • SHA1

      b13a4ae46c177d2e467f92e7ea5966b668da7ca7

    • SHA256

      a468d20f44f8ce7976d9988f72aa2f8aec002ce9c60d1ca3540dc1b3194c4d98

    • SHA512

      90d5fd5e3a46a800368c6a61af21ed93025e193971c050187d7941a5ff0b1a98e9149cab12bf83024bf0cb888a0c61acfc26498983ee9e894638d5d3d704de34

    • SSDEEP

      12288:1MrHy90q2/DWHvqP+wcWM6L+yY8TUs2Cux+4+wSRCFOnfGiULha:WyeSveeWn3YSz2CuEUSoM+ih

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks