General

  • Target

    c989589c460aa0ea1b11ab48658c98063df2918833af5454d1d5acadf0820bd9N

  • Size

    604KB

  • Sample

    240927-mpff3aybmr

  • MD5

    24862159a034fa33b18aa17b0644db70

  • SHA1

    43886e7c379d6525dac04ec4f88a9e322f04c33e

  • SHA256

    c989589c460aa0ea1b11ab48658c98063df2918833af5454d1d5acadf0820bd9

  • SHA512

    4ddac150292d75716c9aff7d49b192334f5757111f02a1c97bcb7329e8d2bea400d0c860e3469b0e5d19394dc93c9b2cecd15745b4a67daa7b3e55721e118fcc

  • SSDEEP

    12288:2MrVy90nQRuyTq/eoXSzTRMgHlXHVZX95Ib/V8vfZ/ZNoX:TyTuyge9zeKXHVV95I7V8vfZHoX

Malware Config

Extracted

Family

redline

Botnet

nanya

C2

77.91.124.82:19071

Attributes
  • auth_value

    640aa5afe54f566d8795f0dc723f8b52

Targets

    • Target

      c989589c460aa0ea1b11ab48658c98063df2918833af5454d1d5acadf0820bd9N

    • Size

      604KB

    • MD5

      24862159a034fa33b18aa17b0644db70

    • SHA1

      43886e7c379d6525dac04ec4f88a9e322f04c33e

    • SHA256

      c989589c460aa0ea1b11ab48658c98063df2918833af5454d1d5acadf0820bd9

    • SHA512

      4ddac150292d75716c9aff7d49b192334f5757111f02a1c97bcb7329e8d2bea400d0c860e3469b0e5d19394dc93c9b2cecd15745b4a67daa7b3e55721e118fcc

    • SSDEEP

      12288:2MrVy90nQRuyTq/eoXSzTRMgHlXHVZX95Ib/V8vfZ/ZNoX:TyTuyge9zeKXHVV95I7V8vfZHoX

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks