General

  • Target

    0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48

  • Size

    2.5MB

  • Sample

    231014-a8fjysge21

  • MD5

    b19aa14d1af7eec01527ffd908c46fd6

  • SHA1

    8d7b2d29a1ac9d9d6c1425d064145c472f4f6f2b

  • SHA256

    0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48

  • SHA512

    14f875a6c9947c45128620e8486675a585f757c6ab186607039d85f49df7b9790145e1ee671374adeb5299f6b4d286cee2dea3c8f7f9cf2a27595e9c1f88a85d

  • SSDEEP

    49152:JVMtyQ3eJzJMn6a3vxL1/GJGyz+8zRAOtm:JVMtMM6SLTE

Malware Config

Extracted

Family

redline

Botnet

ramon

C2

77.91.124.82:19071

Attributes
  • auth_value

    3197576965d9513f115338c233015b40

Targets

    • Target

      0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48

    • Size

      2.5MB

    • MD5

      b19aa14d1af7eec01527ffd908c46fd6

    • SHA1

      8d7b2d29a1ac9d9d6c1425d064145c472f4f6f2b

    • SHA256

      0ec39eb25b58d94b2c9d9420273e533affe90cdcb6e38f025bddd61406c43b48

    • SHA512

      14f875a6c9947c45128620e8486675a585f757c6ab186607039d85f49df7b9790145e1ee671374adeb5299f6b4d286cee2dea3c8f7f9cf2a27595e9c1f88a85d

    • SSDEEP

      49152:JVMtyQ3eJzJMn6a3vxL1/GJGyz+8zRAOtm:JVMtMM6SLTE

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks