General

  • Target

    NEAS.209bf10cdb445c1647d24917f0f7fad1801b8a2ddcafb298d231b3189a398cd0_JC.exe

  • Size

    1.2MB

  • Sample

    231007-m52n8sbb3s

  • MD5

    b1e96ac076f6e08dd5b103eb6720ee3d

  • SHA1

    b0d5ccdf18767a4de814ca099c428d4482069988

  • SHA256

    209bf10cdb445c1647d24917f0f7fad1801b8a2ddcafb298d231b3189a398cd0

  • SHA512

    6bb1b6cebc7e4904b8bcc8250e69fa2a646f20c5966e194a196d6d12c2c7c3090ebf2799ecefc80d04c3524d4e36c17557105d7addfd1c49288adf29f89f1ef6

  • SSDEEP

    24576:gyvbYae6iXxAODqJHtsN+xQawaVQQoyJ:nve8O2htuH3aVQz

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Targets

    • Target

      NEAS.209bf10cdb445c1647d24917f0f7fad1801b8a2ddcafb298d231b3189a398cd0_JC.exe

    • Size

      1.2MB

    • MD5

      b1e96ac076f6e08dd5b103eb6720ee3d

    • SHA1

      b0d5ccdf18767a4de814ca099c428d4482069988

    • SHA256

      209bf10cdb445c1647d24917f0f7fad1801b8a2ddcafb298d231b3189a398cd0

    • SHA512

      6bb1b6cebc7e4904b8bcc8250e69fa2a646f20c5966e194a196d6d12c2c7c3090ebf2799ecefc80d04c3524d4e36c17557105d7addfd1c49288adf29f89f1ef6

    • SSDEEP

      24576:gyvbYae6iXxAODqJHtsN+xQawaVQQoyJ:nve8O2htuH3aVQz

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks