General

  • Target

    42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e

  • Size

    1.2MB

  • Sample

    231011-rjmemsec23

  • MD5

    7dbcdc1affd698e2d1bf305a5b1d5b4d

  • SHA1

    a07ba1082da58913a805e1fa63585c30d170c433

  • SHA256

    ed76b5497fce347e1e441ce34af8d7344bc00c2d1c35cc0da43452d2bd715ed1

  • SHA512

    a1eb833e81d45895bcb003a9216b732adca0d21574e7a26b293da5e8c930430aae49fb1eb3d95eedde69fa647946e8199c592a80555b2f3acc72dff7e522f9cb

  • SSDEEP

    24576:fyEP1WVyiN7bc8bwdZqrrStfIvqRMFI/3uRggyYuPK23iaeagM8jC:jiNEZqyNIv0M+QggyDPKTHfC

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Targets

    • Target

      42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e

    • Size

      1.3MB

    • MD5

      3e6cc6888adf34693f8592cf1e727948

    • SHA1

      bcf6446d49fd822ed6768ca1afbc3556f477c55c

    • SHA256

      42c6150a8e33b720e89825db2be6bc06d76190929c82d03324faa294ef3e184e

    • SHA512

      6366c2f2d657b2816a6c64c05c714ed18ae1a45217b74832a9bbc52fbbb029a1c3e21290eee8eceae45eca28e0f0fa82c5ebf056accf3168341882087aeb2062

    • SSDEEP

      24576:vyr3bebwVRqrJcHffQvyRMhwt3uRge2YAPK23iyeEgw8ja:6rTea/ovsMuSge2vPK717

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks