General

  • Target

    10a7b249bb6251659cfad6b2079b91ba457619002136e9f5737e3b546f0899a4

  • Size

    1.1MB

  • Sample

    231113-rceffsdd72

  • MD5

    2866f5e26a852af515dfb05c87e8c8ec

  • SHA1

    e6e96d20837d36c48d92da52678b988e7aab0d8e

  • SHA256

    10a7b249bb6251659cfad6b2079b91ba457619002136e9f5737e3b546f0899a4

  • SHA512

    44bbe0174932f70c9ff9a8a13ddcc67cf79ad587c091cb054dc68bcafe12389c1c8c2feef34aa620029a9a158e78a64b132aeb87baec1d4d9221559163e9d8bc

  • SSDEEP

    24576:Ty1yppsbsgqmTkts2+6jVqzRHW5NBqYiea87HnZqs5I0Cd0:mVAmTk+2+6jaR2N7a6HZni

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      10a7b249bb6251659cfad6b2079b91ba457619002136e9f5737e3b546f0899a4

    • Size

      1.1MB

    • MD5

      2866f5e26a852af515dfb05c87e8c8ec

    • SHA1

      e6e96d20837d36c48d92da52678b988e7aab0d8e

    • SHA256

      10a7b249bb6251659cfad6b2079b91ba457619002136e9f5737e3b546f0899a4

    • SHA512

      44bbe0174932f70c9ff9a8a13ddcc67cf79ad587c091cb054dc68bcafe12389c1c8c2feef34aa620029a9a158e78a64b132aeb87baec1d4d9221559163e9d8bc

    • SSDEEP

      24576:Ty1yppsbsgqmTkts2+6jVqzRHW5NBqYiea87HnZqs5I0Cd0:mVAmTk+2+6jaR2N7a6HZni

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks