General

  • Target

    d219965b8dc35b7fa94081e8c5bcac69208b46014f5542145674c25451e9428e

  • Size

    1.2MB

  • Sample

    231011-rkkbnsce31

  • MD5

    78c6fa375f7585a5b16b146490ec7446

  • SHA1

    5d703ad33f224626593032d7cef5b60f3458a466

  • SHA256

    9e5a6a5657e3b77ef35c2747d68874ee6b5c8e5e2efb32aa92bd3fe213b4ac3d

  • SHA512

    f7828cda75e82dcf15274411d89b2ba7f55c440658515b13fb1226aa0ce7370fa7a5000e981da8418a4e5e095b24be42bac283919839652b11ac221897001926

  • SSDEEP

    24576:L8XyoSauccJbW8wM/EWCxWLO6cGR4OWviIxVOvjclvTlZR/f:YioFabW3M/cGRZsVOWrlPn

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Targets

    • Target

      d219965b8dc35b7fa94081e8c5bcac69208b46014f5542145674c25451e9428e

    • Size

      1.2MB

    • MD5

      fa27a664f025b42a39b6dc089efb919c

    • SHA1

      a05b7d413dec9c8574a4aa76d98fa6eb36b30f43

    • SHA256

      d219965b8dc35b7fa94081e8c5bcac69208b46014f5542145674c25451e9428e

    • SHA512

      c9e72b8656683b2b8e043ded8f4fe08c3a504ae64c64af29525d45aa831056eace3cc2d82fdaa3eeb8ef73607263a62bccdca0896dda71552c1d0f79fe115605

    • SSDEEP

      24576:6yjsucEJva8G+/EsCxUPOo+iRQNPl6wRgVeNXclLTHfZ/Y:BKivaZ+/OiRAPWVegPHh

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks