General

  • Target

    888df5653562869a84e92ebe444b732d40bddc14b914206695d0160fa18cd748

  • Size

    372KB

  • Sample

    231112-pfcd6afb7z

  • MD5

    86de6dfaa3cb85403d5a8fd2974e01ac

  • SHA1

    969edc452a153640750326eb15823d55c8da2a62

  • SHA256

    888df5653562869a84e92ebe444b732d40bddc14b914206695d0160fa18cd748

  • SHA512

    dc11090ff05eb4363b1b5d1436fff1f68147cfdfbfdfe9d5b5cda8b792a0130a0d732134ff8f831a3a0014e80c55772fcdbe805a501467977f813f49e7534709

  • SSDEEP

    6144:KNy+bnr+hp0yN90QEEZREi98m15+juNBNQZYggbfOF7XDHmF/g4:XMrly90gRES8q5IurVfADQ/g4

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      888df5653562869a84e92ebe444b732d40bddc14b914206695d0160fa18cd748

    • Size

      372KB

    • MD5

      86de6dfaa3cb85403d5a8fd2974e01ac

    • SHA1

      969edc452a153640750326eb15823d55c8da2a62

    • SHA256

      888df5653562869a84e92ebe444b732d40bddc14b914206695d0160fa18cd748

    • SHA512

      dc11090ff05eb4363b1b5d1436fff1f68147cfdfbfdfe9d5b5cda8b792a0130a0d732134ff8f831a3a0014e80c55772fcdbe805a501467977f813f49e7534709

    • SSDEEP

      6144:KNy+bnr+hp0yN90QEEZREi98m15+juNBNQZYggbfOF7XDHmF/g4:XMrly90gRES8q5IurVfADQ/g4

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks