General

  • Target

    7be1a51209c8b55b7d7f2500a6676e3d.bin

  • Size

    874KB

  • Sample

    231112-cwtxxsce3t

  • MD5

    334afd8af3e7a8e58e280f689ce58512

  • SHA1

    c7e1bd5570d4ebd7ddb53024d8b52e9272cc4122

  • SHA256

    40c28814bd43ce1243efd6f60bac4e00371491577d9ec580ca356a2a713b9c6e

  • SHA512

    ba541db9ddecb45d64d6d3eb2047beb836f631e25e3260319e90dd83c2d9008d4aebff019be432b2cd94b5e0af943989c209353400c67cae0b5aec5b9ac04e66

  • SSDEEP

    12288:pDMJLUYZLClfkRo5N77qP62Sz1ZizCu6IvlA8D0rOuRkD43UK6eWrViMkLuVPr:pDM+Dfect7QSz1ZiR9lA6guq2NkCPr

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      8796c468bfdc78e3045bf30c2d6e8eec98503e0b2ee0fbb61dbe1c3dc4279f50.exe

    • Size

      917KB

    • MD5

      7be1a51209c8b55b7d7f2500a6676e3d

    • SHA1

      88a66bc72994bf21631fd9fa5f8b8edf80b87434

    • SHA256

      8796c468bfdc78e3045bf30c2d6e8eec98503e0b2ee0fbb61dbe1c3dc4279f50

    • SHA512

      89a8fa13a58a446cac33a386ae77ab051bda4f8f302f3bae995f6bdf43521350d5ca8b712341056fee8530115cf486b0257e8e8ccc2ecf6b11dfc036b7245d52

    • SSDEEP

      24576:Oy+KBVfYYFtaeuIsSC/GHLYDTk6ObFbL4WO:dpJYIoet1EGM06GFP4

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks