General

  • Target

    833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547

  • Size

    929KB

  • Sample

    231011-gxledsea5s

  • MD5

    17cb84bcdf96d70834272120ae88fc94

  • SHA1

    4b2dc2559f2fbb2e3d0c3b928f6f746ef34613ed

  • SHA256

    833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547

  • SHA512

    ae6afe65cd18c45105c588d69ea1879000254b77a87ff675bea3e26fc37512da466864a67ee7a54ec4480bbe9209fb562bc0e9847e773c57534cfd860279fc0b

  • SSDEEP

    24576:zym/YDvZRoy8Ww1sQSqmPIY0IztB2PvIF7kNJVXrt:G6wQswJSzIY0itBOAU7

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547

    • Size

      929KB

    • MD5

      17cb84bcdf96d70834272120ae88fc94

    • SHA1

      4b2dc2559f2fbb2e3d0c3b928f6f746ef34613ed

    • SHA256

      833eedb3fe113410eb707d83337c7329337b6d0bbeff11d6ae7158534a91e547

    • SHA512

      ae6afe65cd18c45105c588d69ea1879000254b77a87ff675bea3e26fc37512da466864a67ee7a54ec4480bbe9209fb562bc0e9847e773c57534cfd860279fc0b

    • SSDEEP

      24576:zym/YDvZRoy8Ww1sQSqmPIY0IztB2PvIF7kNJVXrt:G6wQswJSzIY0itBOAU7

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks