General

  • Target

    2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a

  • Size

    928KB

  • Sample

    231011-3bzwjsbd7y

  • MD5

    237f0453ec09669ea06948d3d012bca9

  • SHA1

    b57668880ac7bb91fa0a45dde4a6793ae3cde767

  • SHA256

    2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a

  • SHA512

    7a9022858544cee136bf701fca463a85055a92c9f26116596e364f25cb2197fa3d5fda114ba7420592afe3c24929615815857bae2b8f2442d53040b51f7403e7

  • SSDEEP

    12288:dMr6y90rv/kDDwTOIHJcm+vHGvI3igXQnFlr/D63z5ASw32jhGm/QD8F2O316uoV:Ty+2DwTLHOm+uvsQzGDC3ou8FImUD

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a

    • Size

      928KB

    • MD5

      237f0453ec09669ea06948d3d012bca9

    • SHA1

      b57668880ac7bb91fa0a45dde4a6793ae3cde767

    • SHA256

      2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a

    • SHA512

      7a9022858544cee136bf701fca463a85055a92c9f26116596e364f25cb2197fa3d5fda114ba7420592afe3c24929615815857bae2b8f2442d53040b51f7403e7

    • SSDEEP

      12288:dMr6y90rv/kDDwTOIHJcm+vHGvI3igXQnFlr/D63z5ASw32jhGm/QD8F2O316uoV:Ty+2DwTLHOm+uvsQzGDC3ou8FImUD

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks