General

  • Target

    AH1hX64.exe

  • Size

    878KB

  • Sample

    231113-lnaczscd22

  • MD5

    dedddeded05c0ae3ab4c5888e292e60b

  • SHA1

    1ca18d5319626dec7d291563c6624b018b4e0644

  • SHA256

    41c9d672d16a1844e6383a3599b3198adc2e7dca4d66da4b109969dc9a0b4864

  • SHA512

    b2e1872cfc57791f2e5405920c93a3a6afded367c508cbc87d0c1fcadf02e529251e862dfe99027beae89706a4f74c9664f05dcdb10c419847a9d3f2610980d4

  • SSDEEP

    12288:zMrwy90kf7o6/T4WX+3Cpxgae74IC5MpClHGg1PLvXMXiYQmD6AuxLvCWGclwxOV:Xy9HtUegaeUIsICtGIPYD4LXz

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      AH1hX64.exe

    • Size

      878KB

    • MD5

      dedddeded05c0ae3ab4c5888e292e60b

    • SHA1

      1ca18d5319626dec7d291563c6624b018b4e0644

    • SHA256

      41c9d672d16a1844e6383a3599b3198adc2e7dca4d66da4b109969dc9a0b4864

    • SHA512

      b2e1872cfc57791f2e5405920c93a3a6afded367c508cbc87d0c1fcadf02e529251e862dfe99027beae89706a4f74c9664f05dcdb10c419847a9d3f2610980d4

    • SSDEEP

      12288:zMrwy90kf7o6/T4WX+3Cpxgae74IC5MpClHGg1PLvXMXiYQmD6AuxLvCWGclwxOV:Xy9HtUegaeUIsICtGIPYD4LXz

    • Detect Mystic stealer payload

    • Detected google phishing page

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks