General

  • Target

    6b5dcbc63cdd340b698af73c4cd6f87259b76d0eed004ad582acca8acc248436

  • Size

    1.3MB

  • Sample

    231011-1aykzsga29

  • MD5

    d20c1d311e767b18dc0efa7db05eba0d

  • SHA1

    b1446d009d0bbe63aca77b5fc33792240150818d

  • SHA256

    6b5dcbc63cdd340b698af73c4cd6f87259b76d0eed004ad582acca8acc248436

  • SHA512

    12845269635c50e6d47e0894fb253b297e81d38e163e1c77e205836d6bd711cbc854cb1ccdd43db80fbf97e35b59f8aaa37eae346b2dae96f08e451de89054c0

  • SSDEEP

    24576:GyEW/LdinANhIZnsl6F26vlQd4WqleqjWUCIz93P+sL9SewYCNzz8L63r:V7RrNhcnss84zle6CIzU+9SfJx

Malware Config

Extracted

Family

redline

Botnet

nanya

C2

77.91.124.82:19071

Attributes
  • auth_value

    640aa5afe54f566d8795f0dc723f8b52

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Targets

    • Target

      6b5dcbc63cdd340b698af73c4cd6f87259b76d0eed004ad582acca8acc248436

    • Size

      1.3MB

    • MD5

      d20c1d311e767b18dc0efa7db05eba0d

    • SHA1

      b1446d009d0bbe63aca77b5fc33792240150818d

    • SHA256

      6b5dcbc63cdd340b698af73c4cd6f87259b76d0eed004ad582acca8acc248436

    • SHA512

      12845269635c50e6d47e0894fb253b297e81d38e163e1c77e205836d6bd711cbc854cb1ccdd43db80fbf97e35b59f8aaa37eae346b2dae96f08e451de89054c0

    • SSDEEP

      24576:GyEW/LdinANhIZnsl6F26vlQd4WqleqjWUCIz93P+sL9SewYCNzz8L63r:V7RrNhcnss84zle6CIzU+9SfJx

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks