General

  • Target

    9e82e946f2ad435de04e68e4dcc4fa943172de889246ed74cb6a796528bfcf24

  • Size

    1.3MB

  • Sample

    231011-y6q5nsdc54

  • MD5

    aa0ab0d21269b78f1c12da96a416a629

  • SHA1

    9e08ee5b2059aed4ec603f291d2ccca9e5b66ec7

  • SHA256

    9e82e946f2ad435de04e68e4dcc4fa943172de889246ed74cb6a796528bfcf24

  • SHA512

    cce90cb12afbb7e634ec42d10b5fae5950b73bc97e4f097df60f4f87df53b49595778bbf75be6a459e6d8328196a47620383c257f306df3ca260fce924b19eb4

  • SSDEEP

    24576:zyh8Hhbok3i/nj+HXHAcGf63GmXtXXJjWi2bbE:GaHhbosiIXHAy3H9XXJjW5v

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Targets

    • Target

      9e82e946f2ad435de04e68e4dcc4fa943172de889246ed74cb6a796528bfcf24

    • Size

      1.3MB

    • MD5

      aa0ab0d21269b78f1c12da96a416a629

    • SHA1

      9e08ee5b2059aed4ec603f291d2ccca9e5b66ec7

    • SHA256

      9e82e946f2ad435de04e68e4dcc4fa943172de889246ed74cb6a796528bfcf24

    • SHA512

      cce90cb12afbb7e634ec42d10b5fae5950b73bc97e4f097df60f4f87df53b49595778bbf75be6a459e6d8328196a47620383c257f306df3ca260fce924b19eb4

    • SSDEEP

      24576:zyh8Hhbok3i/nj+HXHAcGf63GmXtXXJjWi2bbE:GaHhbosiIXHAy3H9XXJjW5v

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks