General

  • Target

    1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb

  • Size

    1.1MB

  • Sample

    231011-k8qp2afd69

  • MD5

    c4de444d7573131bc61c35cbf6dc7226

  • SHA1

    b542db15bc064307b04e0f249010ad1f4ffbc91b

  • SHA256

    a4149c04f886d49486445c3aa2819af34b1f0f10fa8615ed257d1a085d632f1c

  • SHA512

    a33b48ddbd40de3d8e8cda3a9e7b4dd0da060a0c3f33ded7602628104ed3a8d63d4059c8d1c3af894b0813fddc2a0039dcf0dffd78e1e31d7e75942232e6db7a

  • SSDEEP

    24576:7RyhjT3BrzaydvwMwxdfXeB72lzI4rlnNZDx7gj7u+oU/IL:7Et3BrGydYVpXi72lMwlnNZyj1otL

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Targets

    • Target

      1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb

    • Size

      1.1MB

    • MD5

      11dd5eeddd1c5a8eae4258a5ce11588b

    • SHA1

      4d173b5e48d2a74cc63695b5f7bd1933285aea5d

    • SHA256

      1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb

    • SHA512

      c710bcf98a10285644d500f5b77257a4db745877ae1c79dd6ea877e8e49130ffdf21e0c947e3ac2c8742b163773d32deab6032fdf1ac47beb19f258d5d3db671

    • SSDEEP

      24576:qyBkB3trTW4dv8USxrbXeB7MtzK4ZhpnjZDxDgL7u+qitIc:xBs3tra4dk1/Xi7MtGkhpnjZWL1qQI

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks