General

  • Target

    NEAS.eca9b6f977d54b1c080b2457ca6c6390.exe

  • Size

    768KB

  • Sample

    231118-gjl4rsch7y

  • MD5

    eca9b6f977d54b1c080b2457ca6c6390

  • SHA1

    e6528636fd826b4181bc0b1a203837853d6faf7b

  • SHA256

    1f8f2e9e28f50f64ea2b24fed246c89072904096e4bc15a3595013e3b34c7867

  • SHA512

    2d2defa7e29cde5e66f4721fcd9e376413a304469eb270c432c51e483912eaa6b898a0d2bd35c68258d3ea16aeb7a01a93e5ae33647be8abe4e3f1c1ca2321a9

  • SSDEEP

    12288:KMrvy90WGL1MbXI/tgCdgmL6+I3JPYzxJTZkBvu2kvVc+c/QaOq1ywz2HEmZZ7:VyxGuY1gug5+8JPKJy9oVGlywVWZ7

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      NEAS.eca9b6f977d54b1c080b2457ca6c6390.exe

    • Size

      768KB

    • MD5

      eca9b6f977d54b1c080b2457ca6c6390

    • SHA1

      e6528636fd826b4181bc0b1a203837853d6faf7b

    • SHA256

      1f8f2e9e28f50f64ea2b24fed246c89072904096e4bc15a3595013e3b34c7867

    • SHA512

      2d2defa7e29cde5e66f4721fcd9e376413a304469eb270c432c51e483912eaa6b898a0d2bd35c68258d3ea16aeb7a01a93e5ae33647be8abe4e3f1c1ca2321a9

    • SSDEEP

      12288:KMrvy90WGL1MbXI/tgCdgmL6+I3JPYzxJTZkBvu2kvVc+c/QaOq1ywz2HEmZZ7:VyxGuY1gug5+8JPKJy9oVGlywVWZ7

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks