General

  • Target

    NEAS.4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad_JC.exe

  • Size

    1.0MB

  • Sample

    231007-v37fpseb3s

  • MD5

    f5314aad37f96f2528898fa31897db80

  • SHA1

    cd71af513d2a68bb5d42375fd52034e2ae40ae07

  • SHA256

    4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad

  • SHA512

    289a0a901ea492383a68217c0891817e7143a3d9620e51ea2d25c7f3c5a226d77655008aac7de48502fe87e277053c6ba10674ee4c2c6d76ef014e3582ffd128

  • SSDEEP

    24576:Hyu7JCRDLIpJuVDU9qno4vuHVKw5UaSW8Ek3nWQeQ6:SkJCRDL0J2o9qNvu1KwezzXWQN

Malware Config

Extracted

Family

redline

Botnet

narik

C2

77.91.124.82:19071

Attributes
  • auth_value

    07924f5ef90576eb64faea857b8ba3e5

Targets

    • Target

      NEAS.4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad_JC.exe

    • Size

      1.0MB

    • MD5

      f5314aad37f96f2528898fa31897db80

    • SHA1

      cd71af513d2a68bb5d42375fd52034e2ae40ae07

    • SHA256

      4f5db85b9ff17720a0348db75d45954a63270c63b8259433ef5cbc2739d301ad

    • SHA512

      289a0a901ea492383a68217c0891817e7143a3d9620e51ea2d25c7f3c5a226d77655008aac7de48502fe87e277053c6ba10674ee4c2c6d76ef014e3582ffd128

    • SSDEEP

      24576:Hyu7JCRDLIpJuVDU9qno4vuHVKw5UaSW8Ek3nWQeQ6:SkJCRDL0J2o9qNvu1KwezzXWQN

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks