General

  • Target

    x5418429.exe

  • Size

    390KB

  • Sample

    231011-sw73jsfg9t

  • MD5

    5f7985a9f521b6b691ecf1d2825d5415

  • SHA1

    27fc9d81cc86d57ba6cfa4d962a891bf501bc256

  • SHA256

    fa0d42217544477d6567a594d847f81254321d9cecd8e325d95049d63b4188d0

  • SHA512

    9160c5260432ccdacd55df02fa4dd8c6c543d2337496c77fc097f7b7136a8050db9b47c28f9cb9d434af267d78e06660632853885b140b4537110bdd91477a8d

  • SSDEEP

    6144:Kty+bnr+fp0yN90QE1Ayx1HjNbfdYi7V7+nZJio+ombv1U0tebEc5v5Kw:nMrvy90fnHpbfSi7VEuo/mbtUr4i5Kw

Malware Config

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Targets

    • Target

      x5418429.exe

    • Size

      390KB

    • MD5

      5f7985a9f521b6b691ecf1d2825d5415

    • SHA1

      27fc9d81cc86d57ba6cfa4d962a891bf501bc256

    • SHA256

      fa0d42217544477d6567a594d847f81254321d9cecd8e325d95049d63b4188d0

    • SHA512

      9160c5260432ccdacd55df02fa4dd8c6c543d2337496c77fc097f7b7136a8050db9b47c28f9cb9d434af267d78e06660632853885b140b4537110bdd91477a8d

    • SSDEEP

      6144:Kty+bnr+fp0yN90QE1Ayx1HjNbfdYi7V7+nZJio+ombv1U0tebEc5v5Kw:nMrvy90fnHpbfSi7VEuo/mbtUr4i5Kw

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks