General

  • Target

    0c5b40fbabd22d7b3717286e6e4df432.bin

  • Size

    1.2MB

  • Sample

    231113-bgwmjaeh3s

  • MD5

    61a904f017a1bb81cb64f988acb95f99

  • SHA1

    3401da89a6c6e7666c5159f3036dd5e996d83b19

  • SHA256

    8e091021132307cb42a2d9d3ce1a29688913e98ac3ecc55f814a2017edd0afc3

  • SHA512

    32f54a844c06f9a0c0f613249a90add576f3f0ab5ec5eb79677236fb70bc48e59d97a3181876b9c54366ec2838533ec018e2072a4b512cfd58257359b01d54ef

  • SSDEEP

    24576:UuhlwQrCkoQPLQ1uWOKfHG9FBfLJYhUwAeRiyjVlWm:UEDo9OqG9TLJYyYl/

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123.exe

    • Size

      1.3MB

    • MD5

      0c5b40fbabd22d7b3717286e6e4df432

    • SHA1

      9b8b2a417cf31a3e0d7ee5cde763e89a7c1ae296

    • SHA256

      7e390ca86f3a591a740e6aed05214cf75773e0d38dd70fd194fe26f12e876123

    • SHA512

      d0b3396649579d4ed53d7c57681511b4b23ee7d3f239dd345a8acddd9ace633bc91e6e710c0c2c08aab8d963727b47c14b011a1e89e65303c990203477c04c67

    • SSDEEP

      24576:myCw54TPgJzCJaeaIsUCCGpAfDoEMD+S97T6F6B0E/OVWoDn5Ektgu6WG:1CsukehJxGI03l97T067mWoDttH

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks