General

  • Target

    8411a83cb9f04226bbcec51e67b20f5deeed4db8739f89403f057ca7a78d33ce

  • Size

    891KB

  • Sample

    231011-yjczjabc26

  • MD5

    16cc96317223d3b68d55ec4a44f348f0

  • SHA1

    235cec3e0a53c0bb5234a0c47d3063ea03fc8605

  • SHA256

    a3437c8195ef3b06e7c6d411aac45170f8d49bb324f6c0783fd099249d6c9aa5

  • SHA512

    e6066a124ee1f58c659eaa890a96b415ba16bd512edcaec0819cf4a4d8b9f6821d441d10326e719d866b59f24f1d947c0735d27be7d3a0321c19783bc6d270b9

  • SSDEEP

    24576:L3hyuChyT1hhFPjN+GNivH/5H97khGWB5rFAvm6PAy:L3UuCYT1hrNNidBtSy

Malware Config

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Targets

    • Target

      8411a83cb9f04226bbcec51e67b20f5deeed4db8739f89403f057ca7a78d33ce

    • Size

      935KB

    • MD5

      03ea9bef7721cea95b74044b59cef220

    • SHA1

      cb95296b1c002f95a4c9d5fc144068caaa3b5dd1

    • SHA256

      8411a83cb9f04226bbcec51e67b20f5deeed4db8739f89403f057ca7a78d33ce

    • SHA512

      13c21f0f02bded88f02e35e9cd05c2cbad4ec224a6a5ebadedc05ab62c08bb74b3f11f9c02f82ea2a5286c87a9694d6dae565198390aa40f659c6873dd46fb2b

    • SSDEEP

      24576:ty5pFjVh9PjdkwNivNj5HvbQhyW75rFgFE6XA8r:IzFjVXdfi/tl6

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks