General

  • Target

    0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa

  • Size

    930KB

  • Sample

    231011-sk3npagg69

  • MD5

    b5b8275871d3e90880243c2f63773b44

  • SHA1

    68cee9fcc2c3fb423e76f315e6674ad78c5aa470

  • SHA256

    0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa

  • SHA512

    1797f3f8cf29ef8b3d6f487b5ed8895c8e6f52f40068af26b3a64655ca7abbb2210b530e0a445fa12db73b70fb3dc881d73ff75bb12baf12fa7c7a32797af565

  • SSDEEP

    24576:JyGHzE2na/rmOY642zUZO1sGiNptAS3Q+oUji:8Gi/rfYYzUhGiNAQ5oUj

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Targets

    • Target

      0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa

    • Size

      930KB

    • MD5

      b5b8275871d3e90880243c2f63773b44

    • SHA1

      68cee9fcc2c3fb423e76f315e6674ad78c5aa470

    • SHA256

      0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa

    • SHA512

      1797f3f8cf29ef8b3d6f487b5ed8895c8e6f52f40068af26b3a64655ca7abbb2210b530e0a445fa12db73b70fb3dc881d73ff75bb12baf12fa7c7a32797af565

    • SSDEEP

      24576:JyGHzE2na/rmOY642zUZO1sGiNptAS3Q+oUji:8Gi/rfYYzUhGiNAQ5oUj

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks