General

  • Target

    8c4a9ee1177512380614ea451104288412dba5403d91ba1e41a1f3209b1525e3

  • Size

    373KB

  • Sample

    231112-m1hessff39

  • MD5

    ec74f4896f8475f122142b574ac4ee21

  • SHA1

    b977d05e096749d42fa6bb69a0f2e40a992bd80d

  • SHA256

    8c4a9ee1177512380614ea451104288412dba5403d91ba1e41a1f3209b1525e3

  • SHA512

    3def65f4262611f4180e4682f295b6c3d8435823020039fe2f8b7c4c06b4cd50000865e2b82266b59f050a1c6dc49665a7701cd8f8292c28e24f5ac7c4a2fa3a

  • SSDEEP

    6144:Kgwy+bnr+vp0yN90QEiLNkxT3IVf2gPB3OOS4XrN0BdEfWxt2Y672PBLCb5NJ/mi:trMrvy90ENkxT3U26AOSoGdq8ZnZK3JD

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      8c4a9ee1177512380614ea451104288412dba5403d91ba1e41a1f3209b1525e3

    • Size

      373KB

    • MD5

      ec74f4896f8475f122142b574ac4ee21

    • SHA1

      b977d05e096749d42fa6bb69a0f2e40a992bd80d

    • SHA256

      8c4a9ee1177512380614ea451104288412dba5403d91ba1e41a1f3209b1525e3

    • SHA512

      3def65f4262611f4180e4682f295b6c3d8435823020039fe2f8b7c4c06b4cd50000865e2b82266b59f050a1c6dc49665a7701cd8f8292c28e24f5ac7c4a2fa3a

    • SSDEEP

      6144:Kgwy+bnr+vp0yN90QEiLNkxT3IVf2gPB3OOS4XrN0BdEfWxt2Y672PBLCb5NJ/mi:trMrvy90ENkxT3U26AOSoGdq8ZnZK3JD

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks