General

  • Target

    cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140

  • Size

    930KB

  • Sample

    231010-2rqr5sad75

  • MD5

    84000f9fddee008af0d7e2658aefff85

  • SHA1

    cb3ed781cb475aa5c437fb15f7a1a4558296d11f

  • SHA256

    cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140

  • SHA512

    99544da0697a0bc36df0c86686a175f834fa4c461fb04642de6b9e053dfc4a976c1397aec9900028da0406d2c67dd27cf1d7b679b06697b920d87e3b3513fd24

  • SSDEEP

    12288:DMr5y908AqSy9Drmu/NGFlbDn9W8cqcKc++phoVAJwRVEV/70h0CGgN4Gu+hT/ep:myhDrtwbDGgSV/7U0Stu+h7ebt3j

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140

    • Size

      930KB

    • MD5

      84000f9fddee008af0d7e2658aefff85

    • SHA1

      cb3ed781cb475aa5c437fb15f7a1a4558296d11f

    • SHA256

      cee43279e22dcb77e1bed2ad8f4b85b72bdce87e57a7c3e85566c25756889140

    • SHA512

      99544da0697a0bc36df0c86686a175f834fa4c461fb04642de6b9e053dfc4a976c1397aec9900028da0406d2c67dd27cf1d7b679b06697b920d87e3b3513fd24

    • SSDEEP

      12288:DMr5y908AqSy9Drmu/NGFlbDn9W8cqcKc++phoVAJwRVEV/70h0CGgN4Gu+hT/ep:myhDrtwbDGgSV/7U0Stu+h7ebt3j

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks