General

  • Target

    034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934

  • Size

    929KB

  • Sample

    231011-gqggvsff63

  • MD5

    262b9638b6245d7f8247906cbe04553c

  • SHA1

    c8ce68f28e39e45a7d6890a173c1813ebb8687b7

  • SHA256

    034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934

  • SHA512

    6dc549615f579094375dee6632f2af61872c8870068589288b8794b3cf5c030c1ee2e0300eecd1dceb69c8639ae7ef9c309be8eec34f65460acb3d7d51822893

  • SSDEEP

    24576:RyOzbJqTNy+gPifa1OUzHekU3s8xR3NXZ3:EOzbJqTNy+gq8vSp3Np

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934

    • Size

      929KB

    • MD5

      262b9638b6245d7f8247906cbe04553c

    • SHA1

      c8ce68f28e39e45a7d6890a173c1813ebb8687b7

    • SHA256

      034cce255affd598aec81c2ff724583e2188d0cce603c9145bea8ee94e151934

    • SHA512

      6dc549615f579094375dee6632f2af61872c8870068589288b8794b3cf5c030c1ee2e0300eecd1dceb69c8639ae7ef9c309be8eec34f65460acb3d7d51822893

    • SSDEEP

      24576:RyOzbJqTNy+gPifa1OUzHekU3s8xR3NXZ3:EOzbJqTNy+gq8vSp3Np

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks