General

  • Target

    fa0c8a27e4c5fdeb22ad1551b61aadf6a108053c682f20bb8bb071807e246488

  • Size

    887KB

  • Sample

    231113-2s2wssfd2t

  • MD5

    c291988a584ef6db369035db3c2ce785

  • SHA1

    34897b1e8403e92b5901f9038ed3ac254ae8b661

  • SHA256

    fa0c8a27e4c5fdeb22ad1551b61aadf6a108053c682f20bb8bb071807e246488

  • SHA512

    3d34f2240ad17b8eb74f820596cc2be772c0aa6546ce99bbef74dd3a6dcfd599b7fdf536c78df5f18eabc1d315bde177232b70c50f60265cb52f6cf42567c65e

  • SSDEEP

    24576:Cyh6QXZ9OCU1iH0Eoeyt2ec4TPpKLtaw+CvKn:p8QJ9O/iSN2zuhKLhfK

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      fa0c8a27e4c5fdeb22ad1551b61aadf6a108053c682f20bb8bb071807e246488

    • Size

      887KB

    • MD5

      c291988a584ef6db369035db3c2ce785

    • SHA1

      34897b1e8403e92b5901f9038ed3ac254ae8b661

    • SHA256

      fa0c8a27e4c5fdeb22ad1551b61aadf6a108053c682f20bb8bb071807e246488

    • SHA512

      3d34f2240ad17b8eb74f820596cc2be772c0aa6546ce99bbef74dd3a6dcfd599b7fdf536c78df5f18eabc1d315bde177232b70c50f60265cb52f6cf42567c65e

    • SSDEEP

      24576:Cyh6QXZ9OCU1iH0Eoeyt2ec4TPpKLtaw+CvKn:p8QJ9O/iSN2zuhKLhfK

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks