General

  • Target

    b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N

  • Size

    1.3MB

  • Sample

    241027-pwk18sxeng

  • MD5

    ddd0ccccdae6c3029264f6c8c590f740

  • SHA1

    d571de3c5685afecccadb4b986396c2b71d0319b

  • SHA256

    b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2

  • SHA512

    266c1de909a8e31075c81fdb0438b8a323a22ffb81f770a7828b4d7389be51c3ebb79f94490c697f69f2b807ccf947ffc2bf1dcb869a6913725fbdfc8ac43ae5

  • SSDEEP

    24576:uy/HWQpuiWicr7jYdiLnpaT263Xh+d1XrflaXYF229a0VAvvnVzEupkq5Bc:9/HppuiajU+M3kfjl59a0VMaupk

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Targets

    • Target

      b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2N

    • Size

      1.3MB

    • MD5

      ddd0ccccdae6c3029264f6c8c590f740

    • SHA1

      d571de3c5685afecccadb4b986396c2b71d0319b

    • SHA256

      b4bf15b8ec19f52c7e48ebfdd1fc298b81c344a66ced797b747ced364160b3e2

    • SHA512

      266c1de909a8e31075c81fdb0438b8a323a22ffb81f770a7828b4d7389be51c3ebb79f94490c697f69f2b807ccf947ffc2bf1dcb869a6913725fbdfc8ac43ae5

    • SSDEEP

      24576:uy/HWQpuiWicr7jYdiLnpaT263Xh+d1XrflaXYF229a0VAvvnVzEupkq5Bc:9/HppuiajU+M3kfjl59a0VMaupk

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • Mystic family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Smokeloader family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks