General

  • Target

    NEAS.94781d35282152aad8ab0f88cf76e5559aee6e058db31f8d83655c2710e9b8a1.exe

  • Size

    511KB

  • Sample

    231111-mx3xbsdh71

  • MD5

    97c14a5981a24313692f1d91a0160e1b

  • SHA1

    9335a440704dbe07ae8eb36c15732f62d55b0f41

  • SHA256

    94781d35282152aad8ab0f88cf76e5559aee6e058db31f8d83655c2710e9b8a1

  • SHA512

    0635c01105161bafeaee071a9575a14336efb51bc3cef7e57558a87f2c6e8acd7256f078c49e02df6cbaee6af6aab381f8290686098e6e286738c2f187c0e30b

  • SSDEEP

    12288:9Mrry90JI0JP+SBDcXBY8TUs2Sul+4+wSROFNtg:CyUIMBcRYSz2SuYUSstg

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.94781d35282152aad8ab0f88cf76e5559aee6e058db31f8d83655c2710e9b8a1.exe

    • Size

      511KB

    • MD5

      97c14a5981a24313692f1d91a0160e1b

    • SHA1

      9335a440704dbe07ae8eb36c15732f62d55b0f41

    • SHA256

      94781d35282152aad8ab0f88cf76e5559aee6e058db31f8d83655c2710e9b8a1

    • SHA512

      0635c01105161bafeaee071a9575a14336efb51bc3cef7e57558a87f2c6e8acd7256f078c49e02df6cbaee6af6aab381f8290686098e6e286738c2f187c0e30b

    • SSDEEP

      12288:9Mrry90JI0JP+SBDcXBY8TUs2Sul+4+wSROFNtg:CyUIMBcRYSz2SuYUSstg

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks