General

  • Target

    be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6

  • Size

    938KB

  • Sample

    231012-d3k42aeh62

  • MD5

    95a9952fc3b0f6dc60e827a235402f2c

  • SHA1

    ed3d64ac753c8a3bc67f883833fae4f6c72f251f

  • SHA256

    be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6

  • SHA512

    f06ef467ab5de8b021d8dd3e194caa032a48893f0516fe9745f3298953b030e4eb5e57cb575f9850790eddedd6f7f744d32f803df50527e87cc8481c2b784903

  • SSDEEP

    12288:ZMrqy903rObxYpP6o+XMTk5Nxu8Q+hW1Gavchieak8r2KqRiekI/srJtxJ18BCep:3yCr8mEo+cTQxu8Qzoa2uaKqjSJcR

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6

    • Size

      938KB

    • MD5

      95a9952fc3b0f6dc60e827a235402f2c

    • SHA1

      ed3d64ac753c8a3bc67f883833fae4f6c72f251f

    • SHA256

      be443d0b70edf0e8c9d373b4c7b50c2eb268518930333215ecfd847542d9c0d6

    • SHA512

      f06ef467ab5de8b021d8dd3e194caa032a48893f0516fe9745f3298953b030e4eb5e57cb575f9850790eddedd6f7f744d32f803df50527e87cc8481c2b784903

    • SSDEEP

      12288:ZMrqy903rObxYpP6o+XMTk5Nxu8Q+hW1Gavchieak8r2KqRiekI/srJtxJ18BCep:3yCr8mEo+cTQxu8Qzoa2uaKqjSJcR

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks