General

  • Target

    NEAS.a9b62a0d9b07edc58982991449adc938bc46b1dd5181a452ce17e3185382093f_JC.exe

  • Size

    1.2MB

  • Sample

    231007-qh8qtaeh78

  • MD5

    8dc557089891e8e5fbf8b2d6a957d694

  • SHA1

    af02be8bc29f42005fa67901e78bc2d88575821c

  • SHA256

    a9b62a0d9b07edc58982991449adc938bc46b1dd5181a452ce17e3185382093f

  • SHA512

    e15e832d3793a25b23edc1b58154ce43d17c55c4d8f979c0964037db50172cc0717624f23f80198232c3159106d26adc2c87ba713c5bf05eb9115a98bf385429

  • SSDEEP

    24576:IyBgSEU0k3PdtNJE4R+l2K5lskNZQle+LlIOU2:PqSik31tNJEys5DQQ+LO5

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Targets

    • Target

      NEAS.a9b62a0d9b07edc58982991449adc938bc46b1dd5181a452ce17e3185382093f_JC.exe

    • Size

      1.2MB

    • MD5

      8dc557089891e8e5fbf8b2d6a957d694

    • SHA1

      af02be8bc29f42005fa67901e78bc2d88575821c

    • SHA256

      a9b62a0d9b07edc58982991449adc938bc46b1dd5181a452ce17e3185382093f

    • SHA512

      e15e832d3793a25b23edc1b58154ce43d17c55c4d8f979c0964037db50172cc0717624f23f80198232c3159106d26adc2c87ba713c5bf05eb9115a98bf385429

    • SSDEEP

      24576:IyBgSEU0k3PdtNJE4R+l2K5lskNZQle+LlIOU2:PqSik31tNJEys5DQQ+LO5

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks