General

  • Target

    bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb_JC.exe

  • Size

    930KB

  • Sample

    231010-z9xmasdh26

  • MD5

    8088aba2e188d9b84ebf5a3b652dd4cb

  • SHA1

    70987a6596826aef8c90cb5007f58016a97e8aef

  • SHA256

    bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb

  • SHA512

    62a66bc5d9114cb3fad23369039a94d4ef07b9c8a92dc0c6dcb3383dbe0cb4aa3ccea2938378ca038ba403aa9bfeda0c87b0acfe243d3ce5643e490c6d9cce58

  • SSDEEP

    12288:0Mr4y90ClBFwnijyBzJLoZul+mjf/G96UB+Nde4LrMTgWLponH+vmSBDE/+jpqZx:cytBnjILxcwf46NH3nCzZj+sQrweL

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb_JC.exe

    • Size

      930KB

    • MD5

      8088aba2e188d9b84ebf5a3b652dd4cb

    • SHA1

      70987a6596826aef8c90cb5007f58016a97e8aef

    • SHA256

      bb8fe4694e32e961db930b73d43c5d3afe3169b8394b6e04a5fe53e8f6238beb

    • SHA512

      62a66bc5d9114cb3fad23369039a94d4ef07b9c8a92dc0c6dcb3383dbe0cb4aa3ccea2938378ca038ba403aa9bfeda0c87b0acfe243d3ce5643e490c6d9cce58

    • SSDEEP

      12288:0Mr4y90ClBFwnijyBzJLoZul+mjf/G96UB+Nde4LrMTgWLponH+vmSBDE/+jpqZx:cytBnjILxcwf46NH3nCzZj+sQrweL

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks