General

  • Target

    NEAS.7561f71993904d236e9867ddf0f8fb1d1c3420fb3aedaba38b6ac2b0c844ed44.exe

  • Size

    1.3MB

  • Sample

    231112-w7dvmaad3x

  • MD5

    1a23f3282c9548f9d213928ed130ef80

  • SHA1

    b9294b0779d0ac84515bbecaeecad1303fcaa062

  • SHA256

    7561f71993904d236e9867ddf0f8fb1d1c3420fb3aedaba38b6ac2b0c844ed44

  • SHA512

    3d47f0c42f58696060d645f55db40990173391fb92d1cd919b96b13151bcdc95ef4b9ef5b2ad93ff4b9b3d39b6c0dbe934ebb68a04381c6aee7d17d2e083820b

  • SSDEEP

    24576:ny3qB/eui9ukYaeXIsECGGIxiDfsOUV4A3NnV2+iOu/fW17JitS9siXc:y3qLHUe4dlGRYOUVv9nc+xu/fO119si

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.7561f71993904d236e9867ddf0f8fb1d1c3420fb3aedaba38b6ac2b0c844ed44.exe

    • Size

      1.3MB

    • MD5

      1a23f3282c9548f9d213928ed130ef80

    • SHA1

      b9294b0779d0ac84515bbecaeecad1303fcaa062

    • SHA256

      7561f71993904d236e9867ddf0f8fb1d1c3420fb3aedaba38b6ac2b0c844ed44

    • SHA512

      3d47f0c42f58696060d645f55db40990173391fb92d1cd919b96b13151bcdc95ef4b9ef5b2ad93ff4b9b3d39b6c0dbe934ebb68a04381c6aee7d17d2e083820b

    • SSDEEP

      24576:ny3qB/eui9ukYaeXIsECGGIxiDfsOUV4A3NnV2+iOu/fW17JitS9siXc:y3qLHUe4dlGRYOUVv9nc+xu/fO119si

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks