General

  • Target

    26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29

  • Size

    1.3MB

  • Sample

    231113-xgke6aee4v

  • MD5

    b3db26e05fef02e0d0e5ef1de7a4b57b

  • SHA1

    b77605380920624d2fc77c934c5c148abfe5e580

  • SHA256

    26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29

  • SHA512

    ab5fc82d966fb6153b73aa5da2551a54d4361106710660abcf4de8a9b5f8f9b4d214bf43e74c2111053fa73c08bc024cc7819b73b32eca6543c2a42492218fff

  • SSDEEP

    24576:Hy275jdzF5b0xaSXKjri9m5yLMGk+I+oqB0/uZsixC0:S275jdznb0xPXKjv5ygGDBW41

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29

    • Size

      1.3MB

    • MD5

      b3db26e05fef02e0d0e5ef1de7a4b57b

    • SHA1

      b77605380920624d2fc77c934c5c148abfe5e580

    • SHA256

      26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29

    • SHA512

      ab5fc82d966fb6153b73aa5da2551a54d4361106710660abcf4de8a9b5f8f9b4d214bf43e74c2111053fa73c08bc024cc7819b73b32eca6543c2a42492218fff

    • SSDEEP

      24576:Hy275jdzF5b0xaSXKjri9m5yLMGk+I+oqB0/uZsixC0:S275jdznb0xPXKjv5ygGDBW41

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks