General

  • Target

    NEAS.7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123.exe

  • Size

    1.3MB

  • Sample

    231112-vraycshh42

  • MD5

    0c5b40fbabd22d7b3717286e6e4df432

  • SHA1

    9b8b2a417cf31a3e0d7ee5cde763e89a7c1ae296

  • SHA256

    7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123

  • SHA512

    d0b3396649579d4ed53d7c57681511b4b23ee7d3f239dd345a8acddd9ace633bc91e6e710c0c2c08aab8d963727b47c14b011a1e89e65303c990203477c04c67

  • SSDEEP

    24576:myCw54TPgJzCJaeaIsUCCGpAfDoEMD+S97T6F6B0E/OVWoDn5Ektgu6WG:1CsukehJxGI03l97T067mWoDttH

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123.exe

    • Size

      1.3MB

    • MD5

      0c5b40fbabd22d7b3717286e6e4df432

    • SHA1

      9b8b2a417cf31a3e0d7ee5cde763e89a7c1ae296

    • SHA256

      7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123

    • SHA512

      d0b3396649579d4ed53d7c57681511b4b23ee7d3f239dd345a8acddd9ace633bc91e6e710c0c2c08aab8d963727b47c14b011a1e89e65303c990203477c04c67

    • SSDEEP

      24576:myCw54TPgJzCJaeaIsUCCGpAfDoEMD+S97T6F6B0E/OVWoDn5Ektgu6WG:1CsukehJxGI03l97T067mWoDttH

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks