General

  • Target

    4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.zip

  • Size

    1.4MB

  • Sample

    240402-l7gleaec51

  • MD5

    5d8a732d2fa559b324b35d8397c0dbca

  • SHA1

    8d7b9c8f7f220c731c1a1e4d88348c8d30a26857

  • SHA256

    df41e39db9e086e94dc17e845fb14230e7985e839de0c19039a085fefa0e0e86

  • SHA512

    1d9f69801af941fad8d11018ab208b69f4276da8fa59a0fb1c44eba02e9962824ac830207c93afaff0571e1cd9530d6408d2f31c04004a151ea62349adbdee3d

  • SSDEEP

    24576:bl8r3VR11IgMfomWpcyqWY+7kpzD2BIWjbGq2aW/NgNL3jtCBN0sZkYTVgGC2Y6S:bW3VzKWOMj4pP6/GqM/NQL3G0kSDNy0D

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Targets

    • Target

      4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae.exe

    • Size

      1.4MB

    • MD5

      fb5052956af295a212cf88f91cc44135

    • SHA1

      577c83e4d4902af1bff1b9a63868da8e1e13233c

    • SHA256

      4152cd3aeeebb927e6c14da59f6868d801dc8a30f04f20b25e3e76ed8a7191ae

    • SHA512

      488f0b539c2eae9e9fdc306449b9e2be2a6926cdcc156279b703168684f602c549dd6bab3fdcf8d69c706c4cc059537a32bf0311e5ddaa0e1a5f952ef89c7a3f

    • SSDEEP

      24576:wyEm0mdTAf+ZFjsO7B4oiQTKsyfovwGfCbnVLJg5pXB/xWyjPiQOxTrpIviBLziI:3E+dTVF4YBnrKxewOCRSyyeJ9dZvdD9E

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks