General

  • Target

    5eb17864d33252535a5a4c0cf12ddff10f1d05936f884f9d70559290ef96c8c8

  • Size

    942KB

  • Sample

    231011-pcjztsgc67

  • MD5

    df9ab2495f6c6f36e84ec8596f0afd8e

  • SHA1

    6687383b4ad2f6ddb17a7b3c8ea32a72b11ef94e

  • SHA256

    5eb17864d33252535a5a4c0cf12ddff10f1d05936f884f9d70559290ef96c8c8

  • SHA512

    549f1d1b2ffdf158ab82cb99867b58a4105c19ea41b6e671afe4a7b77e61576e9cda3da089bac6020fd078858d649038015225e47a2991a61a6346de0e57892b

  • SSDEEP

    24576:PymmsW4ojBbzpPCT/sbBtWQH0WAUncc8bWvq1tli:axdoitWQH0WAUncc8bWvq1tl

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Targets

    • Target

      5eb17864d33252535a5a4c0cf12ddff10f1d05936f884f9d70559290ef96c8c8

    • Size

      942KB

    • MD5

      df9ab2495f6c6f36e84ec8596f0afd8e

    • SHA1

      6687383b4ad2f6ddb17a7b3c8ea32a72b11ef94e

    • SHA256

      5eb17864d33252535a5a4c0cf12ddff10f1d05936f884f9d70559290ef96c8c8

    • SHA512

      549f1d1b2ffdf158ab82cb99867b58a4105c19ea41b6e671afe4a7b77e61576e9cda3da089bac6020fd078858d649038015225e47a2991a61a6346de0e57892b

    • SSDEEP

      24576:PymmsW4ojBbzpPCT/sbBtWQH0WAUncc8bWvq1tli:axdoitWQH0WAUncc8bWvq1tl

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks