General

  • Target

    d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968

  • Size

    930KB

  • Sample

    231010-2ajbqshc98

  • MD5

    9f2032e3e45d94c3b45082f3aeec21cb

  • SHA1

    9da8b01d0ff52d32bf237421ea24c345eb1c6783

  • SHA256

    d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968

  • SHA512

    2cf94ac12d7f34ab7d8d3f0f7ea35d55aa57870b12981416cdb83200261311bbcd323e9a74a2cc73f09d311ab019565e1c109697dce1a0f4e03079ea4981fb79

  • SSDEEP

    12288:UMrGy90PmSFP4b1FUTfBMXZQo5itjunCiWs5H/eeQbz293s6kaT8txeLeOc6/Qsb:iyIxi1FwyXZQoJCiFH/dQe/LeH6/h

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968

    • Size

      930KB

    • MD5

      9f2032e3e45d94c3b45082f3aeec21cb

    • SHA1

      9da8b01d0ff52d32bf237421ea24c345eb1c6783

    • SHA256

      d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968

    • SHA512

      2cf94ac12d7f34ab7d8d3f0f7ea35d55aa57870b12981416cdb83200261311bbcd323e9a74a2cc73f09d311ab019565e1c109697dce1a0f4e03079ea4981fb79

    • SSDEEP

      12288:UMrGy90PmSFP4b1FUTfBMXZQo5itjunCiWs5H/eeQbz293s6kaT8txeLeOc6/Qsb:iyIxi1FwyXZQoJCiFH/dQe/LeH6/h

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks