General

  • Target

    6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3

  • Size

    742KB

  • Sample

    231013-1986rsdc6x

  • MD5

    cc79e9124504fdbbcb2b3d95a7ab12f2

  • SHA1

    b855e65a80ed3d7a70b543ef2d70482bee30e465

  • SHA256

    6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3

  • SHA512

    8f91ab29a7853fb2cdaa67e2cad25ed8cba90efa6629bd77da69a8702aeb910045850b3d4cb37ae9f617aa43cdaba44a0fe356c047017d887bcd38164839e243

  • SSDEEP

    12288:21//yfYb5BIQZVtQ7lObpjHj4u9LjHeNdS7oLOQ6Gur5GZa/gdD363hzusZN9:miuBtZelOBHj4mDaNOQ6GY5/g8RzLB

Malware Config

Extracted

Family

redline

Botnet

moner

C2

77.91.124.82:19071

Attributes
  • auth_value

    a94cd9e01643e1945b296c28a2f28707

Targets

    • Target

      6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3

    • Size

      742KB

    • MD5

      cc79e9124504fdbbcb2b3d95a7ab12f2

    • SHA1

      b855e65a80ed3d7a70b543ef2d70482bee30e465

    • SHA256

      6a152d91332c4d9b4b0075cb4745dc80e8f6f3514a9b3c31550be2f31e3b13a3

    • SHA512

      8f91ab29a7853fb2cdaa67e2cad25ed8cba90efa6629bd77da69a8702aeb910045850b3d4cb37ae9f617aa43cdaba44a0fe356c047017d887bcd38164839e243

    • SSDEEP

      12288:21//yfYb5BIQZVtQ7lObpjHj4u9LjHeNdS7oLOQ6Gur5GZa/gdD363hzusZN9:miuBtZelOBHj4mDaNOQ6GY5/g8RzLB

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks