General

  • Target

    72a194ce09ab3c83ef3ca921476d23917984354feb35ee602f02d9aa2d55b33a

  • Size

    892KB

  • Sample

    231114-d292rsgg88

  • MD5

    cec9b75217ac69ead61a286c4ee1927c

  • SHA1

    e7db2ee95ddd6c9c9eff536558baa2959fa2f297

  • SHA256

    72a194ce09ab3c83ef3ca921476d23917984354feb35ee602f02d9aa2d55b33a

  • SHA512

    5f39a74bea174a4018b500cf35bff5a74ed45519809d929e53e879eba157bbdb019fb484e73107fd53ee41f46fa71c3ec3c758fbbe362683de4feda73b6836c2

  • SSDEEP

    24576:by4yfLhmffQhvvb7oFmyE73CvtUvPpMrFns6pkeyYd69S:O44FeQ9vbkFmpDCvt8PSrFs6pFyy6

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      72a194ce09ab3c83ef3ca921476d23917984354feb35ee602f02d9aa2d55b33a

    • Size

      892KB

    • MD5

      cec9b75217ac69ead61a286c4ee1927c

    • SHA1

      e7db2ee95ddd6c9c9eff536558baa2959fa2f297

    • SHA256

      72a194ce09ab3c83ef3ca921476d23917984354feb35ee602f02d9aa2d55b33a

    • SHA512

      5f39a74bea174a4018b500cf35bff5a74ed45519809d929e53e879eba157bbdb019fb484e73107fd53ee41f46fa71c3ec3c758fbbe362683de4feda73b6836c2

    • SSDEEP

      24576:by4yfLhmffQhvvb7oFmyE73CvtUvPpMrFns6pkeyYd69S:O44FeQ9vbkFmpDCvt8PSrFs6pFyy6

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks