General

  • Target

    94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15

  • Size

    742KB

  • Sample

    231014-cp9d2abd61

  • MD5

    2670dec8c84136ccffc4f5845cff9918

  • SHA1

    ad5bfdf880baeec86339601e4213b151b74e01ba

  • SHA256

    94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15

  • SHA512

    ab3eea0f50709c8f1eba115b574df1db5f8187c736de4d46ac7679e73e8b90d12d883658002a2a9a2dba3abc79b55a78933e36999bb6a49b9178fa4b446f8ede

  • SSDEEP

    12288:Ox//yfYb5BIQZVtrdMLIMqn28nJ/w8tPz3WIBdNSj83QZZWq/3K9:KiuBtZWLI1nFJ/tF7EA3sZWqv+

Malware Config

Extracted

Family

redline

Botnet

moner

C2

77.91.124.82:19071

Attributes
  • auth_value

    a94cd9e01643e1945b296c28a2f28707

Targets

    • Target

      94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15

    • Size

      742KB

    • MD5

      2670dec8c84136ccffc4f5845cff9918

    • SHA1

      ad5bfdf880baeec86339601e4213b151b74e01ba

    • SHA256

      94a05718084ef842e3ff49d9cf8c85bed3f58f6f167f396ce8f9cb399c5aad15

    • SHA512

      ab3eea0f50709c8f1eba115b574df1db5f8187c736de4d46ac7679e73e8b90d12d883658002a2a9a2dba3abc79b55a78933e36999bb6a49b9178fa4b446f8ede

    • SSDEEP

      12288:Ox//yfYb5BIQZVtrdMLIMqn28nJ/w8tPz3WIBdNSj83QZZWq/3K9:KiuBtZWLI1nFJ/tF7EA3sZWqv+

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks