General

  • Target

    74dbc3d7bc4b0de17bdd33a872a9d07c9f2f1089c91cc4f59eb2672a256c2841

  • Size

    1.2MB

  • Sample

    231011-rj7qksce2v

  • MD5

    4721682e8f20ab8c33d5ab872b9f80f0

  • SHA1

    279af8e040748d966a145638374a68e0d008086c

  • SHA256

    a9b2b74c36e9b58f487e1cfb7c08770703489e157bee317ec1acdf03843eecab

  • SHA512

    d903650efc03fb94ecf9d7578533e7242665155abde780170d20d70a34fce5519d8885a6382757d326a9b13ddce096e26d3e439c816fb81a7adb8e49624cee1f

  • SSDEEP

    24576:NAUyp8XTjTZm6s1I1SNRDX2q3lD3Ia/lvAu0gJT5FXpCwb0nRn8:2jc/TZm6sa18Tb3J/kqVOwb0nR8

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Targets

    • Target

      74dbc3d7bc4b0de17bdd33a872a9d07c9f2f1089c91cc4f59eb2672a256c2841

    • Size

      1.3MB

    • MD5

      7b49994e9e463dd71b4ab8c09f9a3eb9

    • SHA1

      2fcfaec0bf70816d8221175476b1b7c7d7f523c2

    • SHA256

      74dbc3d7bc4b0de17bdd33a872a9d07c9f2f1089c91cc4f59eb2672a256c2841

    • SHA512

      013d58ca49a50059e817a4d43fb46c8dde2d12f291b3d1e10418dc0607f1a6f7874cc926f0e43c08bc9f1cbae1dcd97b860f713d3a34a2560866ba8e10a985b7

    • SSDEEP

      24576:EyfbdTZK6m7o7oNJDX0qXlp3I6/lTAEqsRT5JzpQwZ0nRnTY:TfZTZK6mM7oTFXXJyIVQwZ0nR

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks