General

  • Target

    504330db8b7d670f9fcde9039b4b8ca398861fe619ec4899bf559fee64b9c38a

  • Size

    935KB

  • Sample

    231011-yyv4naae9z

  • MD5

    fb85d20af246d1e6bf47d67e4afb76ef

  • SHA1

    13ccbe50a6d809bd6577dd52002bf81669381698

  • SHA256

    504330db8b7d670f9fcde9039b4b8ca398861fe619ec4899bf559fee64b9c38a

  • SHA512

    447aef6d1da95545d5e1f7beaa7eb58a25f1785044550a51bafff7b8bbfec5ad2e0e05967df7e65a3b9bc423d157671108c194410b675581c94b9ebbcb84eef6

  • SSDEEP

    24576:Ky/iFJOciGa7eVozSNUvTYZyxFRXqjIje:RaFJOciGa117YUx7H

Malware Config

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Targets

    • Target

      504330db8b7d670f9fcde9039b4b8ca398861fe619ec4899bf559fee64b9c38a

    • Size

      935KB

    • MD5

      fb85d20af246d1e6bf47d67e4afb76ef

    • SHA1

      13ccbe50a6d809bd6577dd52002bf81669381698

    • SHA256

      504330db8b7d670f9fcde9039b4b8ca398861fe619ec4899bf559fee64b9c38a

    • SHA512

      447aef6d1da95545d5e1f7beaa7eb58a25f1785044550a51bafff7b8bbfec5ad2e0e05967df7e65a3b9bc423d157671108c194410b675581c94b9ebbcb84eef6

    • SSDEEP

      24576:Ky/iFJOciGa7eVozSNUvTYZyxFRXqjIje:RaFJOciGa117YUx7H

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks