General

  • Target

    Wextract.exe.vir

  • Size

    1.1MB

  • Sample

    241025-alxvqayfqj

  • MD5

    a97c8dfc5e061cfc5e2e6817b7c76c74

  • SHA1

    a78dbab8b472e19a5dc9cf9757963e7ba81d1eca

  • SHA256

    ef838597447eff451405481eeefd6cff4d9d8f0b2a069e336253482b522ea83b

  • SHA512

    6e69b033084db5f0e187ca9729228dad0221dbae51dc38e0de84f25bea47e6fcfe43cad8180e6d08d4db532ff430700c031171a4bc6e830df281c79d3cb7a014

  • SSDEEP

    24576:Ry/nw5UwS20veuyvtELz1F19e2Nx0dUiLWlkJx2iwBkhDN:E/nw5V0zyK02FMSkEk

Malware Config

Extracted

Family

redline

Botnet

trush

C2

77.91.124.82:19071

Attributes
  • auth_value

    c13814867cde8193679cd0cad2d774be

Targets

    • Target

      Wextract.exe.vir

    • Size

      1.1MB

    • MD5

      a97c8dfc5e061cfc5e2e6817b7c76c74

    • SHA1

      a78dbab8b472e19a5dc9cf9757963e7ba81d1eca

    • SHA256

      ef838597447eff451405481eeefd6cff4d9d8f0b2a069e336253482b522ea83b

    • SHA512

      6e69b033084db5f0e187ca9729228dad0221dbae51dc38e0de84f25bea47e6fcfe43cad8180e6d08d4db532ff430700c031171a4bc6e830df281c79d3cb7a014

    • SSDEEP

      24576:Ry/nw5UwS20veuyvtELz1F19e2Nx0dUiLWlkJx2iwBkhDN:E/nw5V0zyK02FMSkEk

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks