General

  • Target

    999de58f75aa7b5bf23692a429c0edf590719f4a58ace16d057f9a871946ba4e

  • Size

    894KB

  • Sample

    231114-bqeqdagd25

  • MD5

    a987c8d828f7ce0a99a246aea6fcdcc0

  • SHA1

    8e28268f4b1c09418b7cddb03eab412ac04b286b

  • SHA256

    999de58f75aa7b5bf23692a429c0edf590719f4a58ace16d057f9a871946ba4e

  • SHA512

    328c9d1b597b72250a8a020285f30e69c7e3cb5cb6e40e48ffb2ca07918c62390324609e0d223ed4c6d88838936daf42715d9069d84709bca4c155557117c751

  • SSDEEP

    24576:ByVUJKu14qC8qxGKd8xmvhAvMYry/uxmLD/5XwhBPe:0ypVaGvmvhAPrAn/5XwDP

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      999de58f75aa7b5bf23692a429c0edf590719f4a58ace16d057f9a871946ba4e

    • Size

      894KB

    • MD5

      a987c8d828f7ce0a99a246aea6fcdcc0

    • SHA1

      8e28268f4b1c09418b7cddb03eab412ac04b286b

    • SHA256

      999de58f75aa7b5bf23692a429c0edf590719f4a58ace16d057f9a871946ba4e

    • SHA512

      328c9d1b597b72250a8a020285f30e69c7e3cb5cb6e40e48ffb2ca07918c62390324609e0d223ed4c6d88838936daf42715d9069d84709bca4c155557117c751

    • SSDEEP

      24576:ByVUJKu14qC8qxGKd8xmvhAvMYry/uxmLD/5XwhBPe:0ypVaGvmvhAPrAn/5XwDP

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks