General

  • Target

    NEAS.b059c933236a8fb4090e189992f70e925bdee71814c2064642698b41f3c32c8c.exe

  • Size

    1.3MB

  • Sample

    231112-w9vadsba35

  • MD5

    a70e240d6318d81d5a77a07e5edf9d62

  • SHA1

    2280407baf5d363ef6c99448547a0c9c36e51b97

  • SHA256

    b059c933236a8fb4090e189992f70e925bdee71814c2064642698b41f3c32c8c

  • SHA512

    0bc4f33f9a77738ba768b720099a8e36e05c661c9c6418a93bc4d357e280668c12dd2af99e821423dc316d5cf39a6fcc37d5e0ffac6df7d1ae955aec3aa8cfb7

  • SSDEEP

    24576:eyFQ5Rt24FLy89saeFIsgCWGXmIDXSAb2brhAhYdpH4s5D59pp:tFUd1eGFDGLTXkahYdt4s5tb

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.b059c933236a8fb4090e189992f70e925bdee71814c2064642698b41f3c32c8c.exe

    • Size

      1.3MB

    • MD5

      a70e240d6318d81d5a77a07e5edf9d62

    • SHA1

      2280407baf5d363ef6c99448547a0c9c36e51b97

    • SHA256

      b059c933236a8fb4090e189992f70e925bdee71814c2064642698b41f3c32c8c

    • SHA512

      0bc4f33f9a77738ba768b720099a8e36e05c661c9c6418a93bc4d357e280668c12dd2af99e821423dc316d5cf39a6fcc37d5e0ffac6df7d1ae955aec3aa8cfb7

    • SSDEEP

      24576:eyFQ5Rt24FLy89saeFIsgCWGXmIDXSAb2brhAhYdpH4s5D59pp:tFUd1eGFDGLTXkahYdt4s5tb

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks