General

  • Target

    Qm7Rn37.exe

  • Size

    877KB

  • Sample

    231113-lg2hwsbh2w

  • MD5

    5e8dabf4ae3bffe97982ef62e1319693

  • SHA1

    f1d3b7c2b012501359b8704fd45b4c1af26d9ac1

  • SHA256

    d74a03e8bc2404fbc5ef30c7b0dda5b8342eb40173464e75a59caf3719fc9ed3

  • SHA512

    e77180954d2f55d610aaf2aea7480acaef4f88ec4d95fffc750631015906ca33b372617076fb13fdd5caf823127885d0f205cc377d5c80a813625b29576b6f7f

  • SSDEEP

    24576:Vy9GqmQWaeUIsECtGmPYDR2ORMLt4SasvF:w9JvezRiGhYKMh4Y

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      Qm7Rn37.exe

    • Size

      877KB

    • MD5

      5e8dabf4ae3bffe97982ef62e1319693

    • SHA1

      f1d3b7c2b012501359b8704fd45b4c1af26d9ac1

    • SHA256

      d74a03e8bc2404fbc5ef30c7b0dda5b8342eb40173464e75a59caf3719fc9ed3

    • SHA512

      e77180954d2f55d610aaf2aea7480acaef4f88ec4d95fffc750631015906ca33b372617076fb13fdd5caf823127885d0f205cc377d5c80a813625b29576b6f7f

    • SSDEEP

      24576:Vy9GqmQWaeUIsECtGmPYDR2ORMLt4SasvF:w9JvezRiGhYKMh4Y

    • Detect Mystic stealer payload

    • Detected google phishing page

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks