General

  • Target

    704a65fd9f971fc4ec1d6187b4f8819a49e425e22650438e01ec5906c7df7ea7

  • Size

    1.3MB

  • Sample

    231113-tqsakseb83

  • MD5

    99240fb9c640600a826de415b9ffee34

  • SHA1

    4367e339aee8a88b72092d4b99bed1c12749b73a

  • SHA256

    704a65fd9f971fc4ec1d6187b4f8819a49e425e22650438e01ec5906c7df7ea7

  • SHA512

    fceda08d0387bbe99c31a6ca1ad3a4efeac165073432b1f5d87897c8e548040a8e92fc41ac594ddddbb6400e0c6a7d4864f20713bb1e1a49e7620912ca006aa7

  • SSDEEP

    24576:qyNL5qhuvIpaQwKHcqjbCNCSp7qidIQGDacCq0YA2EVjoLbBnAhID9B3:xNL5qIvYJjbAJd/GAYLJJMIDP

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      704a65fd9f971fc4ec1d6187b4f8819a49e425e22650438e01ec5906c7df7ea7

    • Size

      1.3MB

    • MD5

      99240fb9c640600a826de415b9ffee34

    • SHA1

      4367e339aee8a88b72092d4b99bed1c12749b73a

    • SHA256

      704a65fd9f971fc4ec1d6187b4f8819a49e425e22650438e01ec5906c7df7ea7

    • SHA512

      fceda08d0387bbe99c31a6ca1ad3a4efeac165073432b1f5d87897c8e548040a8e92fc41ac594ddddbb6400e0c6a7d4864f20713bb1e1a49e7620912ca006aa7

    • SSDEEP

      24576:qyNL5qhuvIpaQwKHcqjbCNCSp7qidIQGDacCq0YA2EVjoLbBnAhID9B3:xNL5qIvYJjbAJd/GAYLJJMIDP

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks