General

  • Target

    bd1eb9bfa4ea384e19d0d9d1413d3473.bin

  • Size

    873KB

  • Sample

    231112-dkxecacf4z

  • MD5

    39fe6d5f9a6b569add03d7a88f5efd64

  • SHA1

    87ac90db1c292849e844ec990699435536559a38

  • SHA256

    6d2b194595a87e02193845a1adc118d752c75676187fcd9c7101930c655d9d98

  • SHA512

    2d90f0a14a9a8cc3203446e673740e6e6aeb3081b2986e3bdc86665fa9b4f68ddd1513ddf91f65992a8d196a950d29e7a98bf370940779f7539d278d76ff1df1

  • SSDEEP

    12288:iomCybIOTD4+LA8SK1E0DDimKQZlSGQIj2BbLG98yVdsHuK4MqhrUFGS9Rq69S:inPVTD4LubDdLDQL+8y33AqNU99JY

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      b05b5b5854ce0c5b00dca2d9cda190cccabd42550ee3b0353f3387472cc29e13.exe

    • Size

      917KB

    • MD5

      bd1eb9bfa4ea384e19d0d9d1413d3473

    • SHA1

      1061ef813c51e59b1bdd3dce80d506f9bb127483

    • SHA256

      b05b5b5854ce0c5b00dca2d9cda190cccabd42550ee3b0353f3387472cc29e13

    • SHA512

      9900fc86c53c5e0cd9e79b0c19b484708d8dd247389f2d0246cf76236e6b1869270e0fcdf58aa45b4252e110c0f65b8d480fa4cffe2eca10d11ebf65295cf87b

    • SSDEEP

      24576:8yE5waeuIs6C/GFLYDD2qvLD7HDZyHwkL+6Srp:rSJettEG+Wejj8Sr

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks