General

  • Target

    NEAS.ab16aa326faf4cba0bdcb9879ce176b2214dd08e1f9695e345c781240eef2e7f.exe

  • Size

    1.3MB

  • Sample

    231112-whwzxahh3v

  • MD5

    f9062de6e6d699ea3a3ae0d534a42d64

  • SHA1

    5fadab0e47b5a401b6455006a9edf45d4875c637

  • SHA256

    ab16aa326faf4cba0bdcb9879ce176b2214dd08e1f9695e345c781240eef2e7f

  • SHA512

    938e0e0befeab94da8b4d1ec8ffccabbdeed5f0519652c42ff0b0c23ede0f045df0629dafeda0ea8e9fb8e982e0b00772e0c01309a746057acc440dfb7387371

  • SSDEEP

    24576:dycHre85QyFaeLIsYCSGgo4Dx8Ju9lKgfJKMF4SFZgFAxO:4YreKMeENfG+SJuDKgXFpx

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.ab16aa326faf4cba0bdcb9879ce176b2214dd08e1f9695e345c781240eef2e7f.exe

    • Size

      1.3MB

    • MD5

      f9062de6e6d699ea3a3ae0d534a42d64

    • SHA1

      5fadab0e47b5a401b6455006a9edf45d4875c637

    • SHA256

      ab16aa326faf4cba0bdcb9879ce176b2214dd08e1f9695e345c781240eef2e7f

    • SHA512

      938e0e0befeab94da8b4d1ec8ffccabbdeed5f0519652c42ff0b0c23ede0f045df0629dafeda0ea8e9fb8e982e0b00772e0c01309a746057acc440dfb7387371

    • SSDEEP

      24576:dycHre85QyFaeLIsYCSGgo4Dx8Ju9lKgfJKMF4SFZgFAxO:4YreKMeENfG+SJuDKgXFpx

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks