General

  • Target

    d46af5ae12f87f0d86b276445f342c68925fe1762dc4ab781f8d1e74c0ce0770

  • Size

    896KB

  • Sample

    231114-e3gx2sha47

  • MD5

    80ad382ea28edac79405322302c3bd05

  • SHA1

    c43b57109f2a21bf4f59d4a7585fba26e719d6d8

  • SHA256

    d46af5ae12f87f0d86b276445f342c68925fe1762dc4ab781f8d1e74c0ce0770

  • SHA512

    51bb77367465b36b3b0662c5da3287e8f625bd7043c62d3e0fc5e52b1fe432659ea243fed65a78bd2f2fd9b47dae7d46a92ce19358910953e25ceace728b0173

  • SSDEEP

    24576:Vy1zNrmGZS2vFJggoO/dC1UCcaChBH/p6I:wRc2vFJr4OC6/0

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      d46af5ae12f87f0d86b276445f342c68925fe1762dc4ab781f8d1e74c0ce0770

    • Size

      896KB

    • MD5

      80ad382ea28edac79405322302c3bd05

    • SHA1

      c43b57109f2a21bf4f59d4a7585fba26e719d6d8

    • SHA256

      d46af5ae12f87f0d86b276445f342c68925fe1762dc4ab781f8d1e74c0ce0770

    • SHA512

      51bb77367465b36b3b0662c5da3287e8f625bd7043c62d3e0fc5e52b1fe432659ea243fed65a78bd2f2fd9b47dae7d46a92ce19358910953e25ceace728b0173

    • SSDEEP

      24576:Vy1zNrmGZS2vFJggoO/dC1UCcaChBH/p6I:wRc2vFJr4OC6/0

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks