General

  • Target

    d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d

  • Size

    928KB

  • Sample

    231011-hcydwsfb9z

  • MD5

    bacef800a1cc6524cb7a72a1bfb940e1

  • SHA1

    ade0039895a1d0e6179127b9c6cc63df35bfac4c

  • SHA256

    d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d

  • SHA512

    676d3c90763804eb44579ee144a11eb482a9030fe4e57345e4fb67ef679aeaf9a1a411e58939d998b1c20bfa00c1d49c6889c171cc6be4d022a253daf3547c41

  • SSDEEP

    12288:pMrSy90j08aZHByNsyIhKiRxDk5KEwC/L2F2gAtwVmN+LT9eMVsRoDGtWYIE:byd8oBcsySK4x1zCL2Mg1mGpVsSDGYu

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d

    • Size

      928KB

    • MD5

      bacef800a1cc6524cb7a72a1bfb940e1

    • SHA1

      ade0039895a1d0e6179127b9c6cc63df35bfac4c

    • SHA256

      d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d

    • SHA512

      676d3c90763804eb44579ee144a11eb482a9030fe4e57345e4fb67ef679aeaf9a1a411e58939d998b1c20bfa00c1d49c6889c171cc6be4d022a253daf3547c41

    • SSDEEP

      12288:pMrSy90j08aZHByNsyIhKiRxDk5KEwC/L2F2gAtwVmN+LT9eMVsRoDGtWYIE:byd8oBcsySK4x1zCL2Mg1mGpVsSDGYu

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks