General

  • Target

    b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37

  • Size

    942KB

  • Sample

    231011-rwce7sfb29

  • MD5

    503083f2b28105f8a816cee8ac31527d

  • SHA1

    1c78c5e7ac9c163c636e44562c1fb80524b4b001

  • SHA256

    b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37

  • SHA512

    23c4ea6f7d343b60ba109816e825c87c9856ad9d26823aeea40978ba296bd4468142058d75cccf442a30abb7b9a781a1948fbec3b4c26ad5d8643f552e922414

  • SSDEEP

    12288:yMrKy90ZNuFZEgMAKrT3qdV93OOaIz+xuiGfs+b1s057ByY8uDMKjcZlXS+1UFXc:sy4oNSadV5t+efs+n1yagofX5z91Od

Malware Config

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Targets

    • Target

      b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37

    • Size

      942KB

    • MD5

      503083f2b28105f8a816cee8ac31527d

    • SHA1

      1c78c5e7ac9c163c636e44562c1fb80524b4b001

    • SHA256

      b80c9ab2672602ab9d0267dbd15a2941836f3c1faaa6b913ee5d5d02272daa37

    • SHA512

      23c4ea6f7d343b60ba109816e825c87c9856ad9d26823aeea40978ba296bd4468142058d75cccf442a30abb7b9a781a1948fbec3b4c26ad5d8643f552e922414

    • SSDEEP

      12288:yMrKy90ZNuFZEgMAKrT3qdV93OOaIz+xuiGfs+b1s057ByY8uDMKjcZlXS+1UFXc:sy4oNSadV5t+efs+n1yagofX5z91Od

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.