General

  • Target

    ee361fa8358b6c102fd1cfd20f3eb6b3e1b7145729071be643b34863dc78c03f

  • Size

    864KB

  • Sample

    231011-lxk6vahc97

  • MD5

    9f535c22bb69e5e27b64fe405ef3627e

  • SHA1

    a4a42fd2c102db7ec50191e33b48f2d5be4cb0e8

  • SHA256

    393b3211ac79a8b5a962aaf897465841706765df3126cfd5dd54c16aaa21fffe

  • SHA512

    f7f980f7b6035e1c99457c620485dba5918994d720cd3df616736b6bf912441f2622f442fa7b934daeed00166b677762c3b2b15fa008ceb077a2ab00bdb57879

  • SSDEEP

    12288:7Fy90CCpH+xzDtOMByKMwA42pmqkzGFhZKD83ndWBwYQ/GWsA4SC3/gGMzA4vNkQ:hyJCOzDt1zRLzGv4DuHZ4SYMzAoN3KM

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Targets

    • Target

      ee361fa8358b6c102fd1cfd20f3eb6b3e1b7145729071be643b34863dc78c03f

    • Size

      908KB

    • MD5

      46af40167006031e7f96b2adb0a94383

    • SHA1

      b8b525365875535fe7c415046099999b8dd93d48

    • SHA256

      ee361fa8358b6c102fd1cfd20f3eb6b3e1b7145729071be643b34863dc78c03f

    • SHA512

      6d1694cc2e356da4e2a471e9895d9e9b9f537143260e430dbd34f3541ea99e745fceb83e5eb0c45d0ecc332d3b492f447423e3ab2978c8de3278578a005fa1af

    • SSDEEP

      12288:IMrXy90HGxpX+PYtyKMww4249MBHhDGD83vtWdwYQ8hjsg4Sg3BgAMzS4vNeRxml:/yDxZ1zYBiDegjX4SYMzSoNdl

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks