General

  • Target

    555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1

  • Size

    522KB

  • Sample

    241026-zsqgnazdrj

  • MD5

    445f7f64dbdf136608359b3ac09cc3f2

  • SHA1

    a6c747bd747eb775cfb07376e21283e2c44b9c8d

  • SHA256

    555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1

  • SHA512

    906c8127789f8e5afc6059b9ede36c037a021d5ebfdf23ba0724ca823278e86d688ff1e4a374758dd35b2bf1519397407d8537c1598f3fb927bcee9d61a83e3d

  • SSDEEP

    6144:KQy+bnr+jp0yN90QEFhJRfOCrz1ensG/ZmlTjDzLc24vwpgHho8llvrgliPAtt6/:0Mrjy90PhxRTj424vw9cklV4sNLFQx9

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Targets

    • Target

      555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1

    • Size

      522KB

    • MD5

      445f7f64dbdf136608359b3ac09cc3f2

    • SHA1

      a6c747bd747eb775cfb07376e21283e2c44b9c8d

    • SHA256

      555e2e96cadddac7eb38d1d05f1426621d653734fce83d1180239800918df8c1

    • SHA512

      906c8127789f8e5afc6059b9ede36c037a021d5ebfdf23ba0724ca823278e86d688ff1e4a374758dd35b2bf1519397407d8537c1598f3fb927bcee9d61a83e3d

    • SSDEEP

      6144:KQy+bnr+jp0yN90QEFhJRfOCrz1ensG/ZmlTjDzLc24vwpgHho8llvrgliPAtt6/:0Mrjy90PhxRTj424vw9cklV4sNLFQx9

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • Mystic family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks