General

  • Target

    0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa

  • Size

    886KB

  • Sample

    231011-rkwppsed22

  • MD5

    46c82b402d87712c62c33c2e8baf1689

  • SHA1

    07827a4670dc3ccab8854763ee057cac6c174314

  • SHA256

    e3c5cddeaf85d0c3be523822cb4cc8cd4c2676b45b0eb13206d1a1b75ce6e181

  • SHA512

    d57805dcf10b222ae92aec0c2485ec32fccb295d5f622a01a9b60225c5a5c95add3cbbe034c34c0ea8af36b5bcf3c8824953b8a7e7e97050edc3d730ba99f14f

  • SSDEEP

    24576:62yVY2Pa/rmyY+U3mrO1IGChpt6S3Q+wch2Y1:s0/rhYV3m5GCR6Q5wchJ1

Malware Config

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Targets

    • Target

      0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa

    • Size

      930KB

    • MD5

      b5b8275871d3e90880243c2f63773b44

    • SHA1

      68cee9fcc2c3fb423e76f315e6674ad78c5aa470

    • SHA256

      0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa

    • SHA512

      1797f3f8cf29ef8b3d6f487b5ed8895c8e6f52f40068af26b3a64655ca7abbb2210b530e0a445fa12db73b70fb3dc881d73ff75bb12baf12fa7c7a32797af565

    • SSDEEP

      24576:JyGHzE2na/rmOY642zUZO1sGiNptAS3Q+oUji:8Gi/rfYYzUhGiNAQ5oUj

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks