General

  • Target

    c886439281ce82a91ac41d7f7abc7163.bin

  • Size

    873KB

  • Sample

    231112-dtekwscf6y

  • MD5

    848c18eaafd2a7a13a7b04f7c643a2b6

  • SHA1

    537ab0e6747827b1a8b3471427e45de7e8f7f416

  • SHA256

    9304052e1a48781ab0e6053d216b51c66461c757f717ce6f47cbf96f9befd2c4

  • SHA512

    43ef1c0c0db7964ba6fd0bfbd3f2a8932d8de21065647508ed6ae2e406d2a6e0e1b4749a5a65b4903f7b98b7655937197f5a73c22ba787b02bfb687f5b5a846c

  • SSDEEP

    24576:6NJgg/M7m2f/sOXXOeqOojPdxQH79Zypt97ImwvFBL7Zu:K+gUCLOX+eu5yKpDMdbXY

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      4db895f4018f06aba809a04e9ad881155a615ffd37dc5280b92c9c7b65766723.exe

    • Size

      917KB

    • MD5

      c886439281ce82a91ac41d7f7abc7163

    • SHA1

      6c845bacf21033100d484bd4a4612ab8ce258b77

    • SHA256

      4db895f4018f06aba809a04e9ad881155a615ffd37dc5280b92c9c7b65766723

    • SHA512

      cfe4647f7b3c4fc7361c8d66aacce0d4a02ea19af468f43e138d0daa2203a4f532eaffaf25a1ca165b370e81793c09eb82e38c257d4fab6b324b652713dd566b

    • SSDEEP

      24576:wy6Pn7aeuIsuC/GRLYD/RaBJwX6mnALRAp31:3Q+etZEGK4/spEAp

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks