General

  • Target

    c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441

  • Size

    907KB

  • Sample

    231011-l18rbaff6s

  • MD5

    e2464498f3d62fa7a7002f6fc456c38c

  • SHA1

    45b5a8b89ef5c1bf8d074568c29e57bcb35c0146

  • SHA256

    c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441

  • SHA512

    c76303f07e15697751b7db599e0540648b7673512c96bc61cb9399b3d70aa3b7113ec1aadf1958a53c085510a5818ae9a9eb2602279851a6b91e1144c230e040

  • SSDEEP

    12288:WMrUy90z5BbPjuqJunQTTb7y6NvviO7fKnToEzUIyJ0j5tyI3R6JaHfSqrqLYgY:qyiBbPTunQHnygx7fKnT3wIB/SqeL/Y

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Targets

    • Target

      c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441

    • Size

      907KB

    • MD5

      e2464498f3d62fa7a7002f6fc456c38c

    • SHA1

      45b5a8b89ef5c1bf8d074568c29e57bcb35c0146

    • SHA256

      c530068ba7ec9c73af8be16eb1917b6110a9e6315f975f6871d0d36bfcd70441

    • SHA512

      c76303f07e15697751b7db599e0540648b7673512c96bc61cb9399b3d70aa3b7113ec1aadf1958a53c085510a5818ae9a9eb2602279851a6b91e1144c230e040

    • SSDEEP

      12288:WMrUy90z5BbPjuqJunQTTb7y6NvviO7fKnToEzUIyJ0j5tyI3R6JaHfSqrqLYgY:qyiBbPTunQHnygx7fKnT3wIB/SqeL/Y

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks