General

  • Target

    248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.zip

  • Size

    1.8MB

  • Sample

    241011-w1f2eawfrd

  • MD5

    c1e9e1e9ea18bf3d3fced73b0cac0d62

  • SHA1

    ce3d866c3c4388680808f6ba4a6762350f46a4c3

  • SHA256

    8595e924427a373d61d1040b3d3c8068c6530a2b9ad8b4b3a4ba1e3581fb1cb1

  • SHA512

    224cdf7d59de7e97f60576e451f0fe8be9c0d6abcc0495d4854dfeae228ac6edf0528cd4ac7d5fb836934e0a789feff4c2d624d38904f2e647f27af544ca67a7

  • SSDEEP

    49152:FaQ6iwkIx5sZzCetwCL7s1Fu1n9PZFqUc5DLGgt0xIL:KkI4CjzAehRKm

Malware Config

Extracted

Family

redline

Botnet

frant

C2

77.91.124.55:19071

Targets

    • Target

      248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe

    • Size

      1.8MB

    • MD5

      18cbe55c3b28754916f1cbf4dfc95cf9

    • SHA1

      7ccfb7678c34d6a2bedc040da04e2b5201be453b

    • SHA256

      248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b

    • SHA512

      e1d4a7ab164a7e4176a3e4e915480e5c60efe7680d99f0f0bcbd834a4bec1798b951c49ef5c0cca6bea3c2577b475de3c51b2ef1ae70b525d046eb06591f7110

    • SSDEEP

      49152:Eau0Bnly1l8B6hLa5vMIKHVo5W1v2mS0la98MT:Nfy1Wo+JK19eFE6

    • Detect Mystic stealer payload

    • Detected google phishing page

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks