General

  • Target

    a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc

  • Size

    1.1MB

  • Sample

    231011-h7kraabf52

  • MD5

    822349336a1533f98fb3ce01d7075a6a

  • SHA1

    911690599c8f7b1f7e904110d6d28a63fafeafd0

  • SHA256

    a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc

  • SHA512

    56e9e0a24cba99f4e563c15b7546545e7238d9e20d66409ca1e011f5b0a06495d813c3ccfb29dc6cf3966ad730d420f00780789a018a088a34b9c95722565906

  • SSDEEP

    24576:ryAUnMn6XTw4x69hD0cJNYuH8cMxtquD4EMrbmETcKxbE:eAYX8f99NH8cMeHrbmsxb

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc

    • Size

      1.1MB

    • MD5

      822349336a1533f98fb3ce01d7075a6a

    • SHA1

      911690599c8f7b1f7e904110d6d28a63fafeafd0

    • SHA256

      a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc

    • SHA512

      56e9e0a24cba99f4e563c15b7546545e7238d9e20d66409ca1e011f5b0a06495d813c3ccfb29dc6cf3966ad730d420f00780789a018a088a34b9c95722565906

    • SSDEEP

      24576:ryAUnMn6XTw4x69hD0cJNYuH8cMxtquD4EMrbmETcKxbE:eAYX8f99NH8cMeHrbmsxb

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks