General

  • Target

    df7e285ea6b9e1a58685b9eddfa4440eafc60e7819af4eed2354d7335784b8a6

  • Size

    1.2MB

  • Sample

    231011-3gbqxabe8y

  • MD5

    7cad47148c439a91296a9f1862ed9bbc

  • SHA1

    6cc4920d08637eb04f9cd19223f9741170849f1d

  • SHA256

    df7e285ea6b9e1a58685b9eddfa4440eafc60e7819af4eed2354d7335784b8a6

  • SHA512

    9ffc1a7ec0acb82447f63199d515f60072b9c51163e4ca6d7c2212fe82c05cf201d5f4074620bcbbc684aa5e5ccc1fde5f4d84146ccce4664783dde70c9a8fa3

  • SSDEEP

    24576:gymtSNvzsJJ7f+os2bvLQo4N9OTdPZPH2cs6vgaxqM:nmtAIJJ7fRHrLkN9OTd9Wt6nk

Malware Config

Extracted

Family

redline

Botnet

nanya

C2

77.91.124.82:19071

Attributes
  • auth_value

    640aa5afe54f566d8795f0dc723f8b52

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Targets

    • Target

      df7e285ea6b9e1a58685b9eddfa4440eafc60e7819af4eed2354d7335784b8a6

    • Size

      1.2MB

    • MD5

      7cad47148c439a91296a9f1862ed9bbc

    • SHA1

      6cc4920d08637eb04f9cd19223f9741170849f1d

    • SHA256

      df7e285ea6b9e1a58685b9eddfa4440eafc60e7819af4eed2354d7335784b8a6

    • SHA512

      9ffc1a7ec0acb82447f63199d515f60072b9c51163e4ca6d7c2212fe82c05cf201d5f4074620bcbbc684aa5e5ccc1fde5f4d84146ccce4664783dde70c9a8fa3

    • SSDEEP

      24576:gymtSNvzsJJ7f+os2bvLQo4N9OTdPZPH2cs6vgaxqM:nmtAIJJ7fRHrLkN9OTd9Wt6nk

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks