General

  • Target

    NEAS.7ef834fc890f8f801316f859915cba63a0771e89738a882bca0656fda5a74ddf.exe

  • Size

    1.3MB

  • Sample

    231114-l5nxpsbb8t

  • MD5

    2126f48656722b1eb6e5f59fe213b27a

  • SHA1

    ce1806e2df9492580fe3bc59b3b07075f3f6ce85

  • SHA256

    7ef834fc890f8f801316f859915cba63a0771e89738a882bca0656fda5a74ddf

  • SHA512

    02030b677ab9749c3e10be0c560c58bd928c243c13540e2dd4509c9d57f6fe555d39e7fe9c585350e6cccb8be8b7457ad47b529f7d2dbdbb5772071bfc6e5a6c

  • SSDEEP

    24576:eyduNudKvInfMntDR5aeDIskCWGNsxDfzMVbT77p1Wu/HfPKHRH14Xn+6E71wvhh:tdu0dKvjnUestzGWbI5Dp1xHfCz43+vq

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.7ef834fc890f8f801316f859915cba63a0771e89738a882bca0656fda5a74ddf.exe

    • Size

      1.3MB

    • MD5

      2126f48656722b1eb6e5f59fe213b27a

    • SHA1

      ce1806e2df9492580fe3bc59b3b07075f3f6ce85

    • SHA256

      7ef834fc890f8f801316f859915cba63a0771e89738a882bca0656fda5a74ddf

    • SHA512

      02030b677ab9749c3e10be0c560c58bd928c243c13540e2dd4509c9d57f6fe555d39e7fe9c585350e6cccb8be8b7457ad47b529f7d2dbdbb5772071bfc6e5a6c

    • SSDEEP

      24576:eyduNudKvInfMntDR5aeDIskCWGNsxDfzMVbT77p1Wu/HfPKHRH14Xn+6E71wvhh:tdu0dKvjnUestzGWbI5Dp1xHfCz43+vq

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks