General

  • Target

    c40276ad0eb1038cd024c5e4babcf263.bin

  • Size

    874KB

  • Sample

    231112-dpnm1acf5y

  • MD5

    ef398d08af7dc930611abc8a5f86bb4b

  • SHA1

    89d614be8ab384f49152f93793d45c8f762caee8

  • SHA256

    f301efaa69bf684e38050f7562cf250802d0037a8227e084cb2e0ca96bf166a4

  • SHA512

    f10668f26a3fa693e389ead48c13f985de507446526342b60e33f59d1c14ce4909d76fefb396ca327f0e08a72836ceab0500fc58b5f73a91d42797642904fed5

  • SSDEEP

    12288:VRO0KNd53RuHPn7XKR6nA67NhhheXSlDKKxbnz+8rqTHXvUsPIly1AZuptr50WtZ:/O0ARYP7aR6dKPWH+8mTsMH0Wta2

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      6b362b2e24b31baf1345b1510806cdd4ac3af1ad704881421ceae5360312eed8.exe

    • Size

      917KB

    • MD5

      c40276ad0eb1038cd024c5e4babcf263

    • SHA1

      350dc700c78effca3ad37c1020de1ed28e80e052

    • SHA256

      6b362b2e24b31baf1345b1510806cdd4ac3af1ad704881421ceae5360312eed8

    • SHA512

      b2adfdea23fbddaf31101a3daeab1befbb342bcc4c7be75528f6052b6c5c14d5c323345a0ca00f21e7d663198964201a8af0bce37840a5b24a2f07c8efb60306

    • SSDEEP

      24576:iy0ePFmaeuIsGC/GzLYDLffac1GNhp0ceplJ:J3etBEG4iPfp0Fl

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks