General

  • Target

    5e58c7210f9f0753d651e7207240e728.bin

  • Size

    1.2MB

  • Sample

    231113-cfd7jafd7v

  • MD5

    1328955bbab3d3a1506ac32c40e27e55

  • SHA1

    8405e9b3a689af9761652ef6eb9c12f94f5529a3

  • SHA256

    8e3c749de675b1ca65114a10e322ce50d99b41a133d4da333915f5c6d4649bc7

  • SHA512

    082ac51f6f8a6680d6ca619d6671203bc1ee00a0a0335192bb7dd4f74bee3dced3c784a2528b62fca88b290e7ac510ccfb6d15673249a79fa366d6ea700e7f05

  • SSDEEP

    24576:NUbucwqqHbcpsBeWMQV9lSpqHqp+QT7V1JAZbU3YCoZMNTjc+YkJJSpv:iucwqwbcpsBeWMq43JSFZkjcxkJJ0v

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac.exe

    • Size

      1.3MB

    • MD5

      5e58c7210f9f0753d651e7207240e728

    • SHA1

      31b5afd364f5a2ead3433048ee999decf634b12b

    • SHA256

      6d26760a587fb8a383655cbcc5c10785886d3b15ea62adcea8bde5c75e3dd7ac

    • SHA512

      d5a3e34e5e83b2022f370f1e7431a32e988d67162b30d7bb23d4f347a501c3eb8f6dcc6d094f58d87d277bb3a609a6cd8af614c64acffa2989314f692d9eaac6

    • SSDEEP

      24576:2y15jmqo3i96mFae1IsOC0GjShD1IKAKqfV7qYJ0nK8pF9zhfNvK:F15jm9e6xe2jfGiiKte7Fend1

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks