General

  • Target

    6c1531cdd09adcd97eba293dc0beaf71490a4d1741c1044e18c9da5bd1afc531

  • Size

    1.3MB

  • Sample

    231111-y5966abd7t

  • MD5

    b95015a019527e833ae0b34c56191eed

  • SHA1

    682819b44892d38ce27f997c36e3a5f0066a23f5

  • SHA256

    6c1531cdd09adcd97eba293dc0beaf71490a4d1741c1044e18c9da5bd1afc531

  • SHA512

    19ff73232edcd78fa2d561a47a8c9fd2fa1576aea8611624c38a445dea30a53195be4488abeb8d6b541010287993c678cd1672a124aa1aac5792a9555e365ec6

  • SSDEEP

    24576:qy+gV70hU+YKaexIs+CiG2KEDu74uiYqoXosJsWXWSM5W/vz7:xhGhU3eqtJGqi7NasJ7X+s/r

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      6c1531cdd09adcd97eba293dc0beaf71490a4d1741c1044e18c9da5bd1afc531

    • Size

      1.3MB

    • MD5

      b95015a019527e833ae0b34c56191eed

    • SHA1

      682819b44892d38ce27f997c36e3a5f0066a23f5

    • SHA256

      6c1531cdd09adcd97eba293dc0beaf71490a4d1741c1044e18c9da5bd1afc531

    • SHA512

      19ff73232edcd78fa2d561a47a8c9fd2fa1576aea8611624c38a445dea30a53195be4488abeb8d6b541010287993c678cd1672a124aa1aac5792a9555e365ec6

    • SSDEEP

      24576:qy+gV70hU+YKaexIs+CiG2KEDu74uiYqoXosJsWXWSM5W/vz7:xhGhU3eqtJGqi7NasJ7X+s/r

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks