General

  • Target

    8333f53248f207b4fa7abaa1f900a261.bin

  • Size

    873KB

  • Sample

    231112-cybt5ace3y

  • MD5

    777a036fe9cbab32f16267e4e5f870ee

  • SHA1

    0935d5daeda2ebec192516a527a1168df0a0940c

  • SHA256

    4817b7f3e881a5627747a4038cb5d7e9da8f171a502b23fe188ccfb619a8ff46

  • SHA512

    ecce5f732132fcda645ac08df1f5d7a51349b5ca9895b5f2925b5110b7458ce4c21698691883262e6a30b7d79c4e3f039da8031aa982d191b8f34a61e269edfb

  • SSDEEP

    24576:yAY21+cDJh/t5In0xzFhhc6s+SPgWxjX/2GwxQj0P:jwcD7PphWz+aNvRY

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      1f351c6e17a289120d35fe4a1f0bbcdabd289d91fb249162fae7c50f3e3f4618.exe

    • Size

      916KB

    • MD5

      8333f53248f207b4fa7abaa1f900a261

    • SHA1

      b36b42f971c7069fca5383aa8eeeaa8e99f6a6f1

    • SHA256

      1f351c6e17a289120d35fe4a1f0bbcdabd289d91fb249162fae7c50f3e3f4618

    • SHA512

      95c92c8f406ebde3e5ca7aa4038d9314bb8fb884642cfcdaeea5a14027bd5448eb57abb0c63d847063094834d273f811cab6ffbf9c9bdd007c03a7feb3e470fc

    • SSDEEP

      24576:wyC5+n2UE50aeuIsqC/G7LYDPTDOlG1E89yHJohoZAc3:3C5o2UStet9EGAnDOYFyJo2F

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks