General

  • Target

    9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef

  • Size

    1.2MB

  • Sample

    231007-tzpk2sdg2z

  • MD5

    8062d3af8d126f153a6f8d5203972b4b

  • SHA1

    fcaf218814d45ed77751ff21057ad3bca5c6f485

  • SHA256

    9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef

  • SHA512

    b5ee77a25aee48c11c645996f7b7faecdf168e979b5d76afd1093ae28deaa35a01c7db398155f13da6ae757cf05c536688a081ca8e07c332fb7c646b8a8a2f33

  • SSDEEP

    24576:zytYpZ9ztKtIUClvanandVVGNLCgLnKPgLbdj6u5eBrEsaDrR:GepHxVkoTVqLC0KPMdj6wcrEHr

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Targets

    • Target

      9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef

    • Size

      1.2MB

    • MD5

      8062d3af8d126f153a6f8d5203972b4b

    • SHA1

      fcaf218814d45ed77751ff21057ad3bca5c6f485

    • SHA256

      9e0acffebc0952db0a6deca20d7da7842752e7b62fdf17c5a6132cbd82a85fef

    • SHA512

      b5ee77a25aee48c11c645996f7b7faecdf168e979b5d76afd1093ae28deaa35a01c7db398155f13da6ae757cf05c536688a081ca8e07c332fb7c646b8a8a2f33

    • SSDEEP

      24576:zytYpZ9ztKtIUClvanandVVGNLCgLnKPgLbdj6u5eBrEsaDrR:GepHxVkoTVqLC0KPMdj6wcrEHr

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks