General

  • Target

    98568e60dd6aaa4e3bbfbf94d2b5aab06949a6ed4abae6a532d96b142408ea61

  • Size

    973KB

  • Sample

    240817-zpdcxsygll

  • MD5

    7e4bda4dbcb436db5a4e7ec5d047c5ed

  • SHA1

    3a9d516ab0b9e28e77942fb30764bfd2601f4832

  • SHA256

    e19f54b03f54fd3d106f72335cf721bc5f692c823069bd689ca6a6334ed31d92

  • SHA512

    caad688cc473e7b3d906010e9600fbb15e95f198e98aee4cb10ede94b75993126602ae8bc4d67e4db8294fcd62e6c932832adcdcc7e5c41b4732ead06001133e

  • SSDEEP

    24576:9P1WVy5Me/0rQixnl6TtDJ5h4uNCo7WtWH4S/O8Oc:X51c8S6n5h4W774qv

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Targets

    • Target

      98568e60dd6aaa4e3bbfbf94d2b5aab06949a6ed4abae6a532d96b142408ea61

    • Size

      1017KB

    • MD5

      9ff109638c5a001829bdb07be04ad4a9

    • SHA1

      c51ce1cbf7a0fac879e50965467dce23fbdcc28c

    • SHA256

      98568e60dd6aaa4e3bbfbf94d2b5aab06949a6ed4abae6a532d96b142408ea61

    • SHA512

      830a960e75269d0fbaaecee7173a6b1ea154e4c461e25deef9bf9670ab823b694f39b6b8637d5181fecd0ac58db992586fb39d9ff6a65c19af1a969cc0bcad50

    • SSDEEP

      12288:kMrZy90VVFI/tCVY0IcQb3GwzFkp/9D0Fdv5S4eGc4K6jinwaG7C7FK7OW3uwT/o:lykef0rQiXplOrLV4WfODwUZ+j/VE

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks