General

  • Target

    93de95190406d77bed0efceb4c1dbf43.bin

  • Size

    1.2MB

  • Sample

    231113-czhn3afg2t

  • MD5

    3fe653c40aa136eb666792af9db38c1e

  • SHA1

    b96ce90e7abf71699ba8da62125c33a3bb45c824

  • SHA256

    2b0acdbf39b7e97e5742c3a28ae1b16214909f4e60025bc958095a90d91a251f

  • SHA512

    43dd9c602594c3132d6bb87a7e3d3f08f7132263647d710cc746614ec1903d3677518901d327b39520a47dba72bfe4463c85a0661d181548ee642bd159544d2f

  • SSDEEP

    24576:XG98zzLGGbADBFlloUxw78qXXXyCVFj6jOIH/lZzgpmt7mRt0pZeKJpjLf5FTK:298znZbADlO4CTSCXj6jRfmspAIJO

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6.exe

    • Size

      1.3MB

    • MD5

      93de95190406d77bed0efceb4c1dbf43

    • SHA1

      4e355c118045771a2cc90272482fbc446d338a5c

    • SHA256

      134473b70083f20f2884ed3fd9a49f3dfcb9a8c3b6cfdcad8414ec9f0c4c11c6

    • SHA512

      8758327f924787878295fe97d7213071c470bd2454a7241c79f126cbfe8a553da1fc5dc10761fe76b36282a4de9def6e5703181d9f62c0769e4dd60101e932c5

    • SSDEEP

      24576:uyYUHIfgZI9faepIstCiGldXD69ya6k6tGQtjZBSBgz5d:9Y0IfbCeS0LGP+UGQxZoBa5

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks