General

  • Target

    b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea

  • Size

    864KB

  • Sample

    231011-lbqjfadf3t

  • MD5

    33dd3ae3d652768d818a269d8591ddaf

  • SHA1

    fde1e540ef58e5de61f5fd98e81b9fba29e06bef

  • SHA256

    fe2d6154f80dd218fe679f30b90969bfaaabf3e0e308c05529d03be853ffa61a

  • SHA512

    5581fba865b4acb719b4b5d86d7458863019f85ef07847fb2e8bbc6145896aa147608ffbdda2e02882622949ec76c10d2e022fa7c56db572c2371e10ec63cb72

  • SSDEEP

    24576:gDlEP1Mym1zD1RhGAiwfBwR7z9ydCf780LPCM32EpjU:+lim1HNU7hKCf73CD

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Targets

    • Target

      b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea

    • Size

      907KB

    • MD5

      02ddc57e766bf186b0a848221839e5e9

    • SHA1

      59d13a4f71ff1321e7bed568cb670843539dc6e7

    • SHA256

      b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea

    • SHA512

      63dcc3ef1b6af81e6605f6bdc125e7b6202e20196c858a0abd1a92a3e80656628514aff9bc6f7d2ee157bb80f2acd49bc12c540b404fa7ea9b6c3e1f89d8b110

    • SSDEEP

      24576:Vy8D1RsaswjByhRFr9udCv7q0LP2gh2E2o:wwsgoF52Cv7l2

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks