General

  • Target

    x4223126.exe

  • Size

    509KB

  • Sample

    231011-h567hahe3z

  • MD5

    b993f23e7347015a9c19aeea5d39c192

  • SHA1

    b15089ae8da45a4de0e548fb99e9d465fac6abe1

  • SHA256

    ec899066f95a987847b84861ef619f96bec5fd822c5c866af5699987d3d23a02

  • SHA512

    520f873975310d8a3fe73dac6b1d200a1ada6c7646300fff0ab26a90cd97c7c7ae2f9a7e9f403216a1d2188fac72853e81d2669413c922b8f1b5e724f5ec4669

  • SSDEEP

    12288:6MrHy90KGSJPlGkDMo8QAjvGq4MsQ2XY65rKJ6x9ziZw7w:typxlG33Rjk4T68wHzFw

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Targets

    • Target

      x4223126.exe

    • Size

      509KB

    • MD5

      b993f23e7347015a9c19aeea5d39c192

    • SHA1

      b15089ae8da45a4de0e548fb99e9d465fac6abe1

    • SHA256

      ec899066f95a987847b84861ef619f96bec5fd822c5c866af5699987d3d23a02

    • SHA512

      520f873975310d8a3fe73dac6b1d200a1ada6c7646300fff0ab26a90cd97c7c7ae2f9a7e9f403216a1d2188fac72853e81d2669413c922b8f1b5e724f5ec4669

    • SSDEEP

      12288:6MrHy90KGSJPlGkDMo8QAjvGq4MsQ2XY65rKJ6x9ziZw7w:typxlG33Rjk4T68wHzFw

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks