General

  • Target

    dea9537052946aaf1e74a81a67689f6c8e1e9d42ecbddbd097be8dd9517c18a1

  • Size

    1.3MB

  • Sample

    231112-2s199sdc4v

  • MD5

    078dcca9cde08d4e1f2d4571adaad38b

  • SHA1

    86835d52788b6a712a7a67397ae16a19b13704c0

  • SHA256

    dea9537052946aaf1e74a81a67689f6c8e1e9d42ecbddbd097be8dd9517c18a1

  • SHA512

    6c77c95a64ae1998923872355672de46638fcf1e5763edc1aebd81a4dfbad83076c7252208e2f447297fdd82bb0a547fd222c72db60110bef4a8b9b7ae522c0c

  • SSDEEP

    24576:QyEN6y0zss5LaeGIs0CIGjFGDXpV2fg7wt8EjXDTVJju38gchQc:Xwn0t5Oe1rDGwlV2I728Ejtrgc

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      dea9537052946aaf1e74a81a67689f6c8e1e9d42ecbddbd097be8dd9517c18a1

    • Size

      1.3MB

    • MD5

      078dcca9cde08d4e1f2d4571adaad38b

    • SHA1

      86835d52788b6a712a7a67397ae16a19b13704c0

    • SHA256

      dea9537052946aaf1e74a81a67689f6c8e1e9d42ecbddbd097be8dd9517c18a1

    • SHA512

      6c77c95a64ae1998923872355672de46638fcf1e5763edc1aebd81a4dfbad83076c7252208e2f447297fdd82bb0a547fd222c72db60110bef4a8b9b7ae522c0c

    • SSDEEP

      24576:QyEN6y0zss5LaeGIs0CIGjFGDXpV2fg7wt8EjXDTVJju38gchQc:Xwn0t5Oe1rDGwlV2I728Ejtrgc

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks