General

  • Target

    NEAS.95851b55bb8cf51dddaceb24717328b0.exe

  • Size

    885KB

  • Sample

    231117-ecd4gaee85

  • MD5

    95851b55bb8cf51dddaceb24717328b0

  • SHA1

    5312a50cd5fb5c7db66345e657e12c81f418a13f

  • SHA256

    bff178b0346391e8d54f84935d8f82a485c80381ef244ef9368860d4437e7acc

  • SHA512

    21820f05a67020321dd0621f0e04251c3695515a1f15dbf8b4559b20dce69939782e0e36528f98d1c9e2785badbd9903cf3ac01539b1783a86de69719e877524

  • SSDEEP

    12288:aMrTy90HYyTagNx4H7E7cLGWDlvXdQw7LmbgYv/tpIRwJbHJfTJBi+HH/wXB/jZE:pyaYy74bBRvXd5ZAtp1H95nqjZh6

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.95851b55bb8cf51dddaceb24717328b0.exe

    • Size

      885KB

    • MD5

      95851b55bb8cf51dddaceb24717328b0

    • SHA1

      5312a50cd5fb5c7db66345e657e12c81f418a13f

    • SHA256

      bff178b0346391e8d54f84935d8f82a485c80381ef244ef9368860d4437e7acc

    • SHA512

      21820f05a67020321dd0621f0e04251c3695515a1f15dbf8b4559b20dce69939782e0e36528f98d1c9e2785badbd9903cf3ac01539b1783a86de69719e877524

    • SSDEEP

      12288:aMrTy90HYyTagNx4H7E7cLGWDlvXdQw7LmbgYv/tpIRwJbHJfTJBi+HH/wXB/jZE:pyaYy74bBRvXd5ZAtp1H95nqjZh6

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks