General

  • Target

    39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b

  • Size

    742KB

  • Sample

    231014-d8kqfseb9t

  • MD5

    e3b011174462436d3a4532c7cdc273a8

  • SHA1

    7273111902f0bed6595bd44de822024c1c6b390a

  • SHA256

    39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b

  • SHA512

    9ee5fc56ff3082a3d3146791f44086514572d6058b0fc2b31a246b3223de01958f7728ddcbfd937353a56e059065dd1007f4662492544c85b87a0d7cdfbaec6c

  • SSDEEP

    12288:TF//yfYb5BIQZVtv+vm+Gz9CZoVfHfI8ersAmkE5wSK00OjccNFcEzg9:piuBtZuv+94oVf/XYQ1RFcE8

Malware Config

Extracted

Family

redline

Botnet

moner

C2

77.91.124.82:19071

Attributes
  • auth_value

    a94cd9e01643e1945b296c28a2f28707

Targets

    • Target

      39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b

    • Size

      742KB

    • MD5

      e3b011174462436d3a4532c7cdc273a8

    • SHA1

      7273111902f0bed6595bd44de822024c1c6b390a

    • SHA256

      39badd45dcfcf740e008f8ff86547d54238f520ea75eb61229ef99b591be0d3b

    • SHA512

      9ee5fc56ff3082a3d3146791f44086514572d6058b0fc2b31a246b3223de01958f7728ddcbfd937353a56e059065dd1007f4662492544c85b87a0d7cdfbaec6c

    • SSDEEP

      12288:TF//yfYb5BIQZVtv+vm+Gz9CZoVfHfI8ersAmkE5wSK00OjccNFcEzg9:piuBtZuv+94oVf/XYQ1RFcE8

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks