General

  • Target

    94872dd4149a32ad0df4f44d402bd271.bin

  • Size

    1.2MB

  • Sample

    231113-czp35sfg3s

  • MD5

    ef98aad55c6187ed209dd60f68333139

  • SHA1

    fc73210a246377285c2157515d1d817af3159ab2

  • SHA256

    fe4730db71ed4459e549bd9f9176efd41bcc3774711e21f4b1cd5cd34167640f

  • SHA512

    30fd2b9bd2d83dc514cde24761e42156057719493d7b0b8aed77a1dd9139de5c7f7827d0c4ba98cc9d92b309313b512ad43af63932552a3e2f5783715b348fa6

  • SSDEEP

    24576:XNJYpK+cx9TV/K/OniZpJIIVJFLWOzp1mkc+j+yUzKXkr:X0pKxVi0YJIRAmkcA+lKXa

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      e9ac578be907dd8620c4f07a14093563ea4fb9b43d0342547ffdc9ff9d7ffe98.exe

    • Size

      1.3MB

    • MD5

      94872dd4149a32ad0df4f44d402bd271

    • SHA1

      2db1f1f7631931948c4a3c92684548fb36820b78

    • SHA256

      e9ac578be907dd8620c4f07a14093563ea4fb9b43d0342547ffdc9ff9d7ffe98

    • SHA512

      e08b7c427fb1ec178ec6d510a63e83f4b8620e5506c07aa162fbdcf907973f9889057936fc015d126c323bbf14163e15530f5fb76a227e9a5f1f23442b9dc497

    • SSDEEP

      24576:PyexWG+JvXPLaeaIscCEGXVtDOUoqUMVhXe0xYkqinp0rMiXkYDEy:aexWGAfOehLZGHydtyhnxSWyrMq

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks