General

  • Target

    341f8a069dcbf713a42936d787d8a0d1.bin

  • Size

    1.3MB

  • Sample

    231113-bvcftafa9v

  • MD5

    edc50c4960747fef914703f4e2810a0b

  • SHA1

    cae57489ad0519e27baece13fa265363731e0dc2

  • SHA256

    382446b01944a53c606853fe4a42fd8e04212ade5f124acf33f7df5175acd338

  • SHA512

    4d34372a833bdb99e127f6023005931baebdbfb9fcd31ac795e203a2ecd4204be39e55a90933d939c950f034f7c7bc09afbc69ea6162697290fbb10cbc49381c

  • SSDEEP

    24576:+Y4gMki0fdPoTTcveRwp0hGLUeyVB8ot5yce3LXPEIsMhibL8LNoD8vjE0RJ3H6G:+mMkiOZoTT5fGu6W57ebfEINcI5oDMj3

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      6f5029869984f774932ee5eec105cec8daeeb1f5c6411a8089c8dcb0e9ab7747.exe

    • Size

      1.3MB

    • MD5

      341f8a069dcbf713a42936d787d8a0d1

    • SHA1

      93cf489987decb1d262cf3ee38f9eef062f566da

    • SHA256

      6f5029869984f774932ee5eec105cec8daeeb1f5c6411a8089c8dcb0e9ab7747

    • SHA512

      e31c408c56dc5cfebb22fbc8ce099aad39443b24db662512aa78592559340cd135b41fb0d877e9afd9894e891cfacf06677d67205e3ebbf02b7fc2b58f71b8cb

    • SSDEEP

      24576:oywcSW2S0aebIs6CeGlWUDBsA0YkT4srgED/hdyFXaE5W:vwcSUeUzFGZlIBem/hdydaE

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks