General

  • Target

    8daaf9b436e710aa5de5bb9f8dd344c137ea24b7d8ca1e4e62774af63529618e

  • Size

    1.3MB

  • Sample

    231011-y3ex8scg97

  • MD5

    ca0191c93a902037bc3b04de455f482b

  • SHA1

    3975f57942eff951b2f7d6ef93c44ffb03a13f74

  • SHA256

    8daaf9b436e710aa5de5bb9f8dd344c137ea24b7d8ca1e4e62774af63529618e

  • SHA512

    71bd87a391ccd72728bfd4abae171393f083641e88bff5301d5c77ec1afaa4094356d88ad537bbdfc2dc05ff58306a2130dfdc5afa5b7a40c9b8433ea3efde2c

  • SSDEEP

    24576:Aylf7zHoP28csXxIX7GX0mfFxkerVVJJUzlhlyi18:HlDMWQxCHIxdVJJUzz

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Targets

    • Target

      8daaf9b436e710aa5de5bb9f8dd344c137ea24b7d8ca1e4e62774af63529618e

    • Size

      1.3MB

    • MD5

      ca0191c93a902037bc3b04de455f482b

    • SHA1

      3975f57942eff951b2f7d6ef93c44ffb03a13f74

    • SHA256

      8daaf9b436e710aa5de5bb9f8dd344c137ea24b7d8ca1e4e62774af63529618e

    • SHA512

      71bd87a391ccd72728bfd4abae171393f083641e88bff5301d5c77ec1afaa4094356d88ad537bbdfc2dc05ff58306a2130dfdc5afa5b7a40c9b8433ea3efde2c

    • SSDEEP

      24576:Aylf7zHoP28csXxIX7GX0mfFxkerVVJJUzlhlyi18:HlDMWQxCHIxdVJJUzz

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks