General

  • Target

    kY4du58.exe

  • Size

    880KB

  • Sample

    231113-lmr7eabh6t

  • MD5

    710fa0e7598455faf9ba567d56fcec0d

  • SHA1

    1576ba8ce102b5c84bbab15e1bd00676198f9b98

  • SHA256

    1b4d674824b2a1d469ae4518f8ac9fe7a1631988a251481d8390525eef9c423a

  • SHA512

    9b3e9efe2343f8c7bd23a1afe0bddebf72ad0cd2eae521e029099043a3780d1acca0cfda9c27475c5a418debe9ccad2bb12c5c67142a209632d34f876d78f1d7

  • SSDEEP

    24576:0yEvPG5JaeUIs8CtGEPYDJ3SH0ybaSpl:DEvPwkezhiGL8UybaSp

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Extracted

Family

mystic

C2

http://5.42.92.43/loghub/master

Targets

    • Target

      kY4du58.exe

    • Size

      880KB

    • MD5

      710fa0e7598455faf9ba567d56fcec0d

    • SHA1

      1576ba8ce102b5c84bbab15e1bd00676198f9b98

    • SHA256

      1b4d674824b2a1d469ae4518f8ac9fe7a1631988a251481d8390525eef9c423a

    • SHA512

      9b3e9efe2343f8c7bd23a1afe0bddebf72ad0cd2eae521e029099043a3780d1acca0cfda9c27475c5a418debe9ccad2bb12c5c67142a209632d34f876d78f1d7

    • SSDEEP

      24576:0yEvPG5JaeUIs8CtGEPYDJ3SH0ybaSpl:DEvPwkezhiGL8UybaSp

    • Detect Mystic stealer payload

    • Detected google phishing page

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks