General

  • Target

    NEAS.134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6.exe

  • Size

    1.3MB

  • Sample

    231112-xdn9yabb26

  • MD5

    93de95190406d77bed0efceb4c1dbf43

  • SHA1

    4e355c118045771a2cc90272482fbc446d338a5c

  • SHA256

    134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6

  • SHA512

    8758327f924787878295fe97d7213071c470bd2454a7241c79f126cbfe8a553da1fc5dc10761fe76b36282a4de9def6e5703181d9f62c0769e4dd60101e932c5

  • SSDEEP

    24576:uyYUHIfgZI9faepIstCiGldXD69ya6k6tGQtjZBSBgz5d:9Y0IfbCeS0LGP+UGQxZoBa5

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6.exe

    • Size

      1.3MB

    • MD5

      93de95190406d77bed0efceb4c1dbf43

    • SHA1

      4e355c118045771a2cc90272482fbc446d338a5c

    • SHA256

      134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6

    • SHA512

      8758327f924787878295fe97d7213071c470bd2454a7241c79f126cbfe8a553da1fc5dc10761fe76b36282a4de9def6e5703181d9f62c0769e4dd60101e932c5

    • SSDEEP

      24576:uyYUHIfgZI9faepIstCiGldXD69ya6k6tGQtjZBSBgz5d:9Y0IfbCeS0LGP+UGQxZoBa5

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks