General

  • Target

    d190524f57c0539a6f6be04cbc95125d73f13f9f04350a95ad1f38d79c2b6873

  • Size

    1.3MB

  • Sample

    231112-z5gehsca21

  • MD5

    ba1c41657cdce4c98e572816cc24c7a1

  • SHA1

    08f8598052f0fe15c70bb971d86b285cb09102c6

  • SHA256

    d190524f57c0539a6f6be04cbc95125d73f13f9f04350a95ad1f38d79c2b6873

  • SHA512

    779e0621e019368b66957a6671c816caaecfc88805bb56855a5c8ec8da966d1ffac06f8aee25f078676b3c674d22c2d3eb1c473de772f52c157b728ffa0fb21e

  • SSDEEP

    24576:sy08f4NNyVYmj3sWaeOIstC6GFPvDSfuPUUvPB9WDxx57IBoQA2uPobsfL0CW:b07N84veNwJGRNUUHHAx57IBiTfL0C

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      d190524f57c0539a6f6be04cbc95125d73f13f9f04350a95ad1f38d79c2b6873

    • Size

      1.3MB

    • MD5

      ba1c41657cdce4c98e572816cc24c7a1

    • SHA1

      08f8598052f0fe15c70bb971d86b285cb09102c6

    • SHA256

      d190524f57c0539a6f6be04cbc95125d73f13f9f04350a95ad1f38d79c2b6873

    • SHA512

      779e0621e019368b66957a6671c816caaecfc88805bb56855a5c8ec8da966d1ffac06f8aee25f078676b3c674d22c2d3eb1c473de772f52c157b728ffa0fb21e

    • SSDEEP

      24576:sy08f4NNyVYmj3sWaeOIstC6GFPvDSfuPUUvPB9WDxx57IBoQA2uPobsfL0CW:b07N84veNwJGRNUUHHAx57IBiTfL0C

    • Detect Mystic stealer payload

    • Detected google phishing page

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks