General

  • Target

    eb69397dcb1bb2ba3c3bb3d052cbd4f7a3776cb9b0eead096bbfe58566931dc6

  • Size

    1.0MB

  • Sample

    231012-g3vj9abh6t

  • MD5

    e8a6bfe4d71b7db67f065b237a832d66

  • SHA1

    9b4a3f5736c987493efd20a803b02213e8d29c74

  • SHA256

    eb69397dcb1bb2ba3c3bb3d052cbd4f7a3776cb9b0eead096bbfe58566931dc6

  • SHA512

    f084db6c6190f9bbcec9ab33d45531ed22467c3987c6ab4b93ff7ebf7da2ef0b59a252bc17de3671eacfbff08f1800e28b4f0af17379da5159e9cd65dcb3f05d

  • SSDEEP

    24576:2ypR+PnN866gCRMWBUwx9wNn0DNoFhICqq4lHoSN/N:FpR6S66gCRPCwxm+DNuh9D4WS

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      eb69397dcb1bb2ba3c3bb3d052cbd4f7a3776cb9b0eead096bbfe58566931dc6

    • Size

      1.0MB

    • MD5

      e8a6bfe4d71b7db67f065b237a832d66

    • SHA1

      9b4a3f5736c987493efd20a803b02213e8d29c74

    • SHA256

      eb69397dcb1bb2ba3c3bb3d052cbd4f7a3776cb9b0eead096bbfe58566931dc6

    • SHA512

      f084db6c6190f9bbcec9ab33d45531ed22467c3987c6ab4b93ff7ebf7da2ef0b59a252bc17de3671eacfbff08f1800e28b4f0af17379da5159e9cd65dcb3f05d

    • SSDEEP

      24576:2ypR+PnN866gCRMWBUwx9wNn0DNoFhICqq4lHoSN/N:FpR6S66gCRPCwxm+DNuh9D4WS

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks