General

  • Target

    968c5a1bf53c7a85142c69165c083901604aafb1f7a89dcf0d6fc867a640495a

  • Size

    1.2MB

  • Sample

    231007-xcpt3sgh56

  • MD5

    4be99cfc87828f4df9354f48f3c6a188

  • SHA1

    097f7e65ea23bdfbb489b2bd0df0e0d57bebd3ce

  • SHA256

    968c5a1bf53c7a85142c69165c083901604aafb1f7a89dcf0d6fc867a640495a

  • SHA512

    d61410956fd706bd19ded81f89fe96b58628b52a847c155a471bbf7c4839a06a80773dc5de2229ad2938f2203f1dc06835762780e5cc050aae0c85e2b674e5cf

  • SSDEEP

    24576:9y46gSLX2RUPoDmYYp4Fy4KNCj4Gntb1kgzTuPu6:Y46gEXS3KGFytAjR7Wu

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Targets

    • Target

      968c5a1bf53c7a85142c69165c083901604aafb1f7a89dcf0d6fc867a640495a

    • Size

      1.2MB

    • MD5

      4be99cfc87828f4df9354f48f3c6a188

    • SHA1

      097f7e65ea23bdfbb489b2bd0df0e0d57bebd3ce

    • SHA256

      968c5a1bf53c7a85142c69165c083901604aafb1f7a89dcf0d6fc867a640495a

    • SHA512

      d61410956fd706bd19ded81f89fe96b58628b52a847c155a471bbf7c4839a06a80773dc5de2229ad2938f2203f1dc06835762780e5cc050aae0c85e2b674e5cf

    • SSDEEP

      24576:9y46gSLX2RUPoDmYYp4Fy4KNCj4Gntb1kgzTuPu6:Y46gEXS3KGFytAjR7Wu

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks