General

  • Target

    x4222654.exe

  • Size

    827KB

  • Sample

    231011-t912tsae4x

  • MD5

    ff4433c78f31223ec0bb35db1ab705c6

  • SHA1

    e496314120e5f7072d22e64a7bfa78057b622317

  • SHA256

    349dde182f318d917555f4ab656b5e6d2741df5addd12101b809ab1094ed7de3

  • SHA512

    50b7c01edc075b11152387bc6c94d13ccfe6ceba17e84599428ec345ab5647a26551e5e6bcf1aa091d261aa5e74c08b6e7c5665cd3639a2fd4bc5d9caf6686e3

  • SSDEEP

    12288:BMrVy90JgrNzP1rc0XZt7hyucJhaA96MwsmVOAiEeZmvWvnjeAlnHgDRRTS2S9Lx:8yugrNZrJdhyuyHLwsmcOFW7fADbStx

Malware Config

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Targets

    • Target

      x4222654.exe

    • Size

      827KB

    • MD5

      ff4433c78f31223ec0bb35db1ab705c6

    • SHA1

      e496314120e5f7072d22e64a7bfa78057b622317

    • SHA256

      349dde182f318d917555f4ab656b5e6d2741df5addd12101b809ab1094ed7de3

    • SHA512

      50b7c01edc075b11152387bc6c94d13ccfe6ceba17e84599428ec345ab5647a26551e5e6bcf1aa091d261aa5e74c08b6e7c5665cd3639a2fd4bc5d9caf6686e3

    • SSDEEP

      12288:BMrVy90JgrNzP1rc0XZt7hyucJhaA96MwsmVOAiEeZmvWvnjeAlnHgDRRTS2S9Lx:8yugrNZrJdhyuyHLwsmcOFW7fADbStx

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks