General

  • Target

    a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183

  • Size

    928KB

  • Sample

    231010-2yskbagg3s

  • MD5

    7e9038f0075273341c946e6d0a898503

  • SHA1

    6f137da0a8a75adfdafbde89dae5f18ff710fe96

  • SHA256

    a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183

  • SHA512

    d0f60d45acc701d23bb3d48c9e18b6a4388c1f0352b1cf91f008cc36da4f9354dacaaca919c2b47a0dd8d7a0f407950af2828617caa2cbc8564a8bfe6c93625b

  • SSDEEP

    12288:ZMrYy90b3brxBN4FdFynLszbHw03KFvijorCSmsXzQMSrQMsiOc6H4AbZCG6AXz:Zy+bVBN4FdFSETw058sYQMuQMGc6H5D

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183

    • Size

      928KB

    • MD5

      7e9038f0075273341c946e6d0a898503

    • SHA1

      6f137da0a8a75adfdafbde89dae5f18ff710fe96

    • SHA256

      a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183

    • SHA512

      d0f60d45acc701d23bb3d48c9e18b6a4388c1f0352b1cf91f008cc36da4f9354dacaaca919c2b47a0dd8d7a0f407950af2828617caa2cbc8564a8bfe6c93625b

    • SSDEEP

      12288:ZMrYy90b3brxBN4FdFynLszbHw03KFvijorCSmsXzQMSrQMsiOc6H4AbZCG6AXz:Zy+bVBN4FdFSETw058sYQMuQMGc6H5D

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks