General

  • Target

    fe4b1bb2a1c62a725fde05966feb1ba1.bin

  • Size

    873KB

  • Sample

    231112-ehzbladd94

  • MD5

    45c4a506358dbc07846cfd1e5a1f64d2

  • SHA1

    82d5c606a305b9d4b48aa932790dc8b42edc2146

  • SHA256

    60914e7b5981a2a998e83e1901a21bef6fcc55a92f760693678258eae42aeddc

  • SHA512

    f2adb0a8ca7bfd5b7de78f1b1bcb6f923a35544fc5ed0c686273c6520353365c36340af61a793fcecc1d083b3dab55ef32f106218e71829eb34eb28aa5c4287d

  • SSDEEP

    24576:Oi1n/kqI/C7kdJxaiuKijMcb8C8DXXQUm9bVHi86qRLZkT52:hJMqmY1vb8C8YTi8hLGl2

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      0318a39c985b9af2d7fb6d6fe9d56eb1c464545d4994db3508b54d42987e1201.exe

    • Size

      917KB

    • MD5

      fe4b1bb2a1c62a725fde05966feb1ba1

    • SHA1

      0d8622306a0396b9f9405cc1dcd8dd9665df58be

    • SHA256

      0318a39c985b9af2d7fb6d6fe9d56eb1c464545d4994db3508b54d42987e1201

    • SHA512

      0a2de1420b40054f3018072bde54cecf15addd2d228798bec93a967f400faf0d0bf89aff1adb83a4e92d7d336480879d3c5bc6d8b9f1cc22c09caff49b3941ec

    • SSDEEP

      24576:dyG2QdhO81i/aeuIs+C/GzLYDXVGkSR5KGnMZXBkfKfm:4G22O81iietBEG4MB5KsEXYK

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks