General

  • Target

    c2ccbf9609bd92c1fe8d4f2cfe8650bef40c22f1cdf081e67c3975c79d176e9b_JC.exe

  • Size

    1.1MB

  • Sample

    231012-xzy19sce86

  • MD5

    4e48816d6f26b50eaee3457fa7556fc3

  • SHA1

    fd732fc3b862c0f59deb654855dc0e2e69823e8c

  • SHA256

    c2ccbf9609bd92c1fe8d4f2cfe8650bef40c22f1cdf081e67c3975c79d176e9b

  • SHA512

    c816b229bdb2504bd6b8bf6bf9fc876b2511598516cb96e777b20355ea58e990c7e11d18d23a2b545541f30ebb9772472fffaa6be3e74b3ac686d20835f9b4ab

  • SSDEEP

    24576:MyroAPZ5rOTgbNg2O1YlnUQs8r1GQFfWRgJlKI18U9ZXFMAQ02ttb+N:7roAiTwO1YTfGYNJNd9V+lJb

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Extracted

Family

redline

Botnet

frant

C2

77.91.124.55:19071

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

pixelscloud2.0

C2

85.209.176.128:80

Targets

    • Target

      c2ccbf9609bd92c1fe8d4f2cfe8650bef40c22f1cdf081e67c3975c79d176e9b_JC.exe

    • Size

      1.1MB

    • MD5

      4e48816d6f26b50eaee3457fa7556fc3

    • SHA1

      fd732fc3b862c0f59deb654855dc0e2e69823e8c

    • SHA256

      c2ccbf9609bd92c1fe8d4f2cfe8650bef40c22f1cdf081e67c3975c79d176e9b

    • SHA512

      c816b229bdb2504bd6b8bf6bf9fc876b2511598516cb96e777b20355ea58e990c7e11d18d23a2b545541f30ebb9772472fffaa6be3e74b3ac686d20835f9b4ab

    • SSDEEP

      24576:MyroAPZ5rOTgbNg2O1YlnUQs8r1GQFfWRgJlKI18U9ZXFMAQ02ttb+N:7roAiTwO1YTfGYNJNd9V+lJb

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

Tasks