General

  • Target

    728c49c705c2feb57d418020de79d64a70e728af8722694958b0e86a156152bf

  • Size

    1017KB

  • Sample

    241017-y2h89sxckr

  • MD5

    0d9105c6c005d3c86ef90c753021550a

  • SHA1

    16e32851b8c1e013e47e9c9527bcfeeeda468ba9

  • SHA256

    728c49c705c2feb57d418020de79d64a70e728af8722694958b0e86a156152bf

  • SHA512

    86c6ddbd5fd60fabc93d9d8ce0b22bda1136315e13e0feec13851a14a606057e99f4b1fa180de0264c3ea2457048bde7716556416388656385a6fbaf91606d4c

  • SSDEEP

    24576:zyjZWkc+tgpL+IJ0I2SwBCRtVjnh/9+OEYWcXRGg:GMkeUI2PoRtVjnh/9+zYWc

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Targets

    • Target

      728c49c705c2feb57d418020de79d64a70e728af8722694958b0e86a156152bf

    • Size

      1017KB

    • MD5

      0d9105c6c005d3c86ef90c753021550a

    • SHA1

      16e32851b8c1e013e47e9c9527bcfeeeda468ba9

    • SHA256

      728c49c705c2feb57d418020de79d64a70e728af8722694958b0e86a156152bf

    • SHA512

      86c6ddbd5fd60fabc93d9d8ce0b22bda1136315e13e0feec13851a14a606057e99f4b1fa180de0264c3ea2457048bde7716556416388656385a6fbaf91606d4c

    • SSDEEP

      24576:zyjZWkc+tgpL+IJ0I2SwBCRtVjnh/9+OEYWcXRGg:GMkeUI2PoRtVjnh/9+zYWc

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks