General

  • Target

    bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4

  • Size

    917KB

  • Sample

    231113-le61lacc33

  • MD5

    896f79811e26b6cef2d52f2d0fbdd3be

  • SHA1

    07905fc9177ca3cdd0a6cc85c6506a6bc50f6108

  • SHA256

    bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4

  • SHA512

    3260ad539ccca98365ce4a261b59e759d77270087fd5160e1401d7513ac498d9acdc4b445e52e25876aa7f75e29939645bd50570bcd978bd19eabb0276334a38

  • SSDEEP

    24576:hyUAMiX50aeuIs6C/GVLYDpRSdi4/p+dT2D:UrtetjEGuFRcp+d

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4

    • Size

      917KB

    • MD5

      896f79811e26b6cef2d52f2d0fbdd3be

    • SHA1

      07905fc9177ca3cdd0a6cc85c6506a6bc50f6108

    • SHA256

      bb8967f03efd35fc925cbc37eb307b97bfd0d0c01dad070125f30a83a9270ea4

    • SHA512

      3260ad539ccca98365ce4a261b59e759d77270087fd5160e1401d7513ac498d9acdc4b445e52e25876aa7f75e29939645bd50570bcd978bd19eabb0276334a38

    • SSDEEP

      24576:hyUAMiX50aeuIs6C/GVLYDpRSdi4/p+dT2D:UrtetjEGuFRcp+d

    • Detect Mystic stealer payload

    • Detected google phishing page

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks