General

  • Target

    ac3d6df2d29be83092f47a7bb6c225b8.exe

  • Size

    942KB

  • Sample

    231011-pbgs3sgb73

  • MD5

    ac3d6df2d29be83092f47a7bb6c225b8

  • SHA1

    a90bd7284e56899cffc4a65c78193909da747215

  • SHA256

    56aab62d74b9eb930483f2ef8a14085de117c2c603d135a3985c4eab4688d432

  • SHA512

    aca372a037b4efeb7f680c2c6cbb53f58d0cc77e4236b0cc151ec114bab2dbf649aecac587c42f7da61a2030cebe67958291759f72d15dbe09a6e53a08c33e0a

  • SSDEEP

    24576:FyhUhR/koGcOHbCoQpuwT7QnOot4eoozWkwf3zAUHY8OPa5:gmR/zGLHbCoKT7QnOM4eolf3ROS

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Targets

    • Target

      ac3d6df2d29be83092f47a7bb6c225b8.exe

    • Size

      942KB

    • MD5

      ac3d6df2d29be83092f47a7bb6c225b8

    • SHA1

      a90bd7284e56899cffc4a65c78193909da747215

    • SHA256

      56aab62d74b9eb930483f2ef8a14085de117c2c603d135a3985c4eab4688d432

    • SHA512

      aca372a037b4efeb7f680c2c6cbb53f58d0cc77e4236b0cc151ec114bab2dbf649aecac587c42f7da61a2030cebe67958291759f72d15dbe09a6e53a08c33e0a

    • SSDEEP

      24576:FyhUhR/koGcOHbCoQpuwT7QnOot4eoozWkwf3zAUHY8OPa5:gmR/zGLHbCoKT7QnOM4eolf3ROS

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks