General

  • Target

    ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1

  • Size

    1.1MB

  • Sample

    231011-h5rrtabd92

  • MD5

    7f391f9bd79aad9469fe2e03f8f7b81d

  • SHA1

    d2d873edebc27b2a0ffc36a3fc24dd2996885694

  • SHA256

    ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1

  • SHA512

    0af548fa45286a0ba2515167eccafd3f572696dda77967235a5779c6c307d33b863d16c42ed24b6acc0a0210491c39c7babae15dd5829fa629022c22a060745b

  • SSDEEP

    24576:wy4kBPcrb04MJ3hCNmrHU5NIctnBb8lZ2rJEVWZpO13VZkJ:34nf04GRzrAImkZWZpMlZ

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1

    • Size

      1.1MB

    • MD5

      7f391f9bd79aad9469fe2e03f8f7b81d

    • SHA1

      d2d873edebc27b2a0ffc36a3fc24dd2996885694

    • SHA256

      ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1

    • SHA512

      0af548fa45286a0ba2515167eccafd3f572696dda77967235a5779c6c307d33b863d16c42ed24b6acc0a0210491c39c7babae15dd5829fa629022c22a060745b

    • SSDEEP

      24576:wy4kBPcrb04MJ3hCNmrHU5NIctnBb8lZ2rJEVWZpO13VZkJ:34nf04GRzrAImkZWZpMlZ

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks