General

  • Target

    NEAS.b8ac09129e3ca9f02b622ffbcc2dbcc0.exe

  • Size

    425KB

  • Sample

    231117-enyl9afg8w

  • MD5

    b8ac09129e3ca9f02b622ffbcc2dbcc0

  • SHA1

    ddcde3a13e0c24edf98abc5e7b01fe92a630eac2

  • SHA256

    bf2c1800bafcd4d5217d71b9a33e77bafb1cc22a70933514c4ff387c364c4487

  • SHA512

    5af46b7cc5754de53db1086c6eafcd1c4db6ad3bb2b143118599cc4b814b440d95ac80308c9bf0fe38c98bfa28646d41d758e689dc39cf30b72f377e031d6aaa

  • SSDEEP

    12288:AMrYy90nCI8MWCKcgeO9Cuvpt5oSWTbgS8n+pen:oyGCItKnNvpt5+O+c

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      NEAS.b8ac09129e3ca9f02b622ffbcc2dbcc0.exe

    • Size

      425KB

    • MD5

      b8ac09129e3ca9f02b622ffbcc2dbcc0

    • SHA1

      ddcde3a13e0c24edf98abc5e7b01fe92a630eac2

    • SHA256

      bf2c1800bafcd4d5217d71b9a33e77bafb1cc22a70933514c4ff387c364c4487

    • SHA512

      5af46b7cc5754de53db1086c6eafcd1c4db6ad3bb2b143118599cc4b814b440d95ac80308c9bf0fe38c98bfa28646d41d758e689dc39cf30b72f377e031d6aaa

    • SSDEEP

      12288:AMrYy90nCI8MWCKcgeO9Cuvpt5oSWTbgS8n+pen:oyGCItKnNvpt5+O+c

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks