General

  • Target

    341f8a069dcbf713a42936d787d8a0d1.exe

  • Size

    1.3MB

  • Sample

    231111-mq39hsef36

  • MD5

    341f8a069dcbf713a42936d787d8a0d1

  • SHA1

    93cf489987decb1d262cf3ee38f9eef062f566da

  • SHA256

    6f5029869984f774932ee5eec105cec8daeeb1f5c6411a8089c8dcb0e9ab7747

  • SHA512

    e31c408c56dc5cfebb22fbc8ce099aad39443b24db662512aa78592559340cd135b41fb0d877e9afd9894e891cfacf06677d67205e3ebbf02b7fc2b58f71b8cb

  • SSDEEP

    24576:oywcSW2S0aebIs6CeGlWUDBsA0YkT4srgED/hdyFXaE5W:vwcSUeUzFGZlIBem/hdydaE

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      341f8a069dcbf713a42936d787d8a0d1.exe

    • Size

      1.3MB

    • MD5

      341f8a069dcbf713a42936d787d8a0d1

    • SHA1

      93cf489987decb1d262cf3ee38f9eef062f566da

    • SHA256

      6f5029869984f774932ee5eec105cec8daeeb1f5c6411a8089c8dcb0e9ab7747

    • SHA512

      e31c408c56dc5cfebb22fbc8ce099aad39443b24db662512aa78592559340cd135b41fb0d877e9afd9894e891cfacf06677d67205e3ebbf02b7fc2b58f71b8cb

    • SSDEEP

      24576:oywcSW2S0aebIs6CeGlWUDBsA0YkT4srgED/hdyFXaE5W:vwcSUeUzFGZlIBem/hdydaE

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks