General

  • Target

    93bc18083d1d0ce5a24ed83862e6e2b3.bin

  • Size

    874KB

  • Sample

    231112-c74w9sce6x

  • MD5

    3f47bd783863e564f00136ddf518934b

  • SHA1

    1661cec68109a7c037850c6c380223c34293d759

  • SHA256

    c67cb8a9cc2615d1dcbe85eb30f3d2df9ad187362d008d6ff0303ea9466ff16b

  • SHA512

    6fdbaf0e277bcc25056e069fb16a27d452785c16e805df78e9eb5dc13b914c37a7c69caa981e49e918acc23b574b4cd6bd03ffd5199d92b24cd7380d9360bf78

  • SSDEEP

    24576:IRkkAnXWyesxfNreZVmDYmNokRtcEiU6AB/6iko:YkkGGyjajmSkvctQ6to

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      4727a1d0474ce49aaf736e5adf1b4eb1aab534e3366be7b16ee597787208d096.exe

    • Size

      917KB

    • MD5

      93bc18083d1d0ce5a24ed83862e6e2b3

    • SHA1

      9efc1147e9e079812a68a5b68d0703468ce088a5

    • SHA256

      4727a1d0474ce49aaf736e5adf1b4eb1aab534e3366be7b16ee597787208d096

    • SHA512

      266b1220d5e5c13b290e20c9b6fd7a2f87f18cafa56767030737e2be9c6c550735adb557eaefb906ae449d893485fa92ef08607073dd35befcead5de0faf9b55

    • SSDEEP

      24576:iy+xEOR5AaeuIsmC/G9LYDj5lrbdnzyJX2DXGS:J+xxnZetHEG2xlvdnzC2i

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks