General

  • Target

    aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c

  • Size

    929KB

  • Sample

    231010-2bn9dafd7z

  • MD5

    78ca7e8b46ee79803b25186fce5d90d8

  • SHA1

    11a847c3d8991603eb1c6e9ea05f3a569eba119f

  • SHA256

    aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c

  • SHA512

    1642dfd2b78ba46f76119f526436f2c6a24208a21128f7cd0f586cee0f1b8e2a3cf9b3e4b044776d602d299e92fef583bb8b0ce274142e0163c2be9aa5e392a6

  • SSDEEP

    12288:mMrCy90rVZDGHW8433uN/JXpxEH30EZEox/j8fqFD/MX5dq6r0vcOzdXX:4ysCr433u/z6ENox//FDMX3qcOzNX

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c

    • Size

      929KB

    • MD5

      78ca7e8b46ee79803b25186fce5d90d8

    • SHA1

      11a847c3d8991603eb1c6e9ea05f3a569eba119f

    • SHA256

      aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c

    • SHA512

      1642dfd2b78ba46f76119f526436f2c6a24208a21128f7cd0f586cee0f1b8e2a3cf9b3e4b044776d602d299e92fef583bb8b0ce274142e0163c2be9aa5e392a6

    • SSDEEP

      12288:mMrCy90rVZDGHW8433uN/JXpxEH30EZEox/j8fqFD/MX5dq6r0vcOzdXX:4ysCr433u/z6ENox//FDMX3qcOzNX

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks