General

  • Target

    3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922

  • Size

    1.1MB

  • Sample

    231011-k365tsfa88

  • MD5

    67ab1194db48b22b48894a6439bcfa30

  • SHA1

    32097b8066781092d766e7a8aaabf1d9d5c90867

  • SHA256

    3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922

  • SHA512

    7e4944276c16cbce6064b78dd8d70e37e48ed0c5d990c36cf22bdc0741fd18eb657d8fc3cda89bdd4101044f1b6134e2ecfaf4f5c0520c696fdfc0493cabe443

  • SSDEEP

    24576:ByIqMK7EuWVB8jlVUB4BHvYNPaTcTR1M832dYP5M8zykkJKp6Iqd:0Nd7EuW+lVpBHvYNieR1MG2dYM8uPJg

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Targets

    • Target

      3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922

    • Size

      1.1MB

    • MD5

      67ab1194db48b22b48894a6439bcfa30

    • SHA1

      32097b8066781092d766e7a8aaabf1d9d5c90867

    • SHA256

      3bc1ba609de280db198eba52e5ea7122a37dbac6ce74e4b970414f4ff281c922

    • SHA512

      7e4944276c16cbce6064b78dd8d70e37e48ed0c5d990c36cf22bdc0741fd18eb657d8fc3cda89bdd4101044f1b6134e2ecfaf4f5c0520c696fdfc0493cabe443

    • SSDEEP

      24576:ByIqMK7EuWVB8jlVUB4BHvYNPaTcTR1M832dYP5M8zykkJKp6Iqd:0Nd7EuW+lVpBHvYNieR1MG2dYM8uPJg

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks