General

  • Target

    909182a4ae4d0aff248ce1cc77ea5004.bin

  • Size

    875KB

  • Sample

    231112-c4rsjadb77

  • MD5

    0af4df539e01cabf184abef43940d935

  • SHA1

    6e7b3141f9628f1b91da72010525839c5768f4a8

  • SHA256

    7b6189cc4818488f353f3eacdfa649c2f42656a6697c2a6268dd4c3dc79e466d

  • SHA512

    90d99274b536b75efc1a007757d028f3703a7cb0e93b192a8e357e6d78bff267a4b72f285d38c8275ea747cc2c52cbbcd16ba7db6fcc9ce6940728e74c438a71

  • SSDEEP

    24576:Jnq8LlQmr4i3JErvr81hAnw8IveUdLCU9g:Jq8uDKJErvo1+wZGKLP9g

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      f414d222ed8a741f09e628ea177621bb850e440941fa4f6d54e81f3211d1c604.exe

    • Size

      919KB

    • MD5

      909182a4ae4d0aff248ce1cc77ea5004

    • SHA1

      3b2aa06940d541492fd19893adfcc7628d512cbd

    • SHA256

      f414d222ed8a741f09e628ea177621bb850e440941fa4f6d54e81f3211d1c604

    • SHA512

      e6ef3a49f2a832a7817c1d074d83508e38f964f26a70f11775fa1a2ee2e943ca4ea6d52393b472bc1a96294672fbf02fc5ec3547092667bca4f7c296bfddc2e5

    • SSDEEP

      24576:GyphPYaeuIsuC/GRLYDb/21Ka1rSRrSwY:VpetZEGK/u1zS

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks