General

  • Target

    a13c2608bc3f12fa340363e5ee8209f6.bin

  • Size

    875KB

  • Sample

    231112-db2ygace9x

  • MD5

    91766cd1b2eda3286903f791a5d21a88

  • SHA1

    508ec706cfea5f3726692f64c65e223dd3438bb8

  • SHA256

    35df5c45a300393e76a342e309e89b0c28ead964f52b380ea3ea7d72ed429163

  • SHA512

    f74aa3410bd4f5bf2190aef1eeabe02752652ffbaf35259c3e6b99892106f5d69cf3dd8634b27287794ba2ef4aab63ce0c52ec21fd2cc23fe8a25789d3c1f515

  • SSDEEP

    24576:QY7zD0WLv86BRLVti/9lxMbjV4uWuV6w/cXH4D4y:QY3dpVtiLWjP6w0XYF

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      722b697b069f14055f310f1fce742889c4207dea00f0cb912a4d105c1403f72e.exe

    • Size

      918KB

    • MD5

      a13c2608bc3f12fa340363e5ee8209f6

    • SHA1

      e38c4caa67fae600467638d6277f52c5b1dc3113

    • SHA256

      722b697b069f14055f310f1fce742889c4207dea00f0cb912a4d105c1403f72e

    • SHA512

      ab28506e4c42ac98bb45ea598bb455d8aaafabf57d1fad610ddae4c262d37db9bb9ce99ec3fd364442c509b08f7ae34259b17667ac8154aaa21af17be6915cb7

    • SSDEEP

      24576:Ny+vp1sN5/haeuIs6C/GVLYDDg3DZCSC8bL8:odN50et7EGuED0cL

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks