General

  • Target

    04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66

  • Size

    930KB

  • Sample

    231010-18jjqahb26

  • MD5

    09fbae84aa07d41fcee287feada2a51c

  • SHA1

    086d771b8b9769d12332d00c40678af8472d3f4e

  • SHA256

    04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66

  • SHA512

    35d90401c9f02ab5d3ca1b56b333bd8154cb329bd1dd6d2e2c59cc01668b6e580e0f7ef98bc995b51cf53d04aa62ff0a68f411588af225c0fdb2c2626cf20355

  • SSDEEP

    12288:3Mr8y90EfLVUZBBb4V/WMdtsfl/RwZqzKHjc2TfB0yCwuVPMP3DMDDuXIPlLXD88:zyriZBSVeDfpyeAjgTmTMDRPhwO3

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66

    • Size

      930KB

    • MD5

      09fbae84aa07d41fcee287feada2a51c

    • SHA1

      086d771b8b9769d12332d00c40678af8472d3f4e

    • SHA256

      04739c3ee371d4840e2a26c403a6d0ae18b972fdbf35b71c6edbcd4989b09f66

    • SHA512

      35d90401c9f02ab5d3ca1b56b333bd8154cb329bd1dd6d2e2c59cc01668b6e580e0f7ef98bc995b51cf53d04aa62ff0a68f411588af225c0fdb2c2626cf20355

    • SSDEEP

      12288:3Mr8y90EfLVUZBBb4V/WMdtsfl/RwZqzKHjc2TfB0yCwuVPMP3DMDDuXIPlLXD88:zyriZBSVeDfpyeAjgTmTMDRPhwO3

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks