General

  • Target

    3686e746ce7172063ac3b749b5f98a3e86e422dca03472a5feba9871dd65bb5d

  • Size

    548KB

  • Sample

    241028-1q6ljawlbv

  • MD5

    df3a1a0c571e06dbf9e9f228872b9825

  • SHA1

    b3915508ea8ef4392bb50317a6686e26a47b7f21

  • SHA256

    3686e746ce7172063ac3b749b5f98a3e86e422dca03472a5feba9871dd65bb5d

  • SHA512

    0582b9d2c0ba09dee5357d4ddb7d15ee7d2178a1165a4168a6a874703e8c5b8f521450d66eb66b74fe2a8f5e0bf25007cfc65f9d6559c65bcf07d940db0e5df4

  • SSDEEP

    12288:HMr9y90qXlWAXlb9ssmU4aAJBHrKYk7czBg+Nc:+yHWcssZ4aAJBLKX7cNg+Nc

Malware Config

Extracted

Family

redline

Botnet

virad

C2

77.91.124.82:19071

Attributes
  • auth_value

    434dd63619ca8bbf10125913fb40ca28

Targets

    • Target

      3686e746ce7172063ac3b749b5f98a3e86e422dca03472a5feba9871dd65bb5d

    • Size

      548KB

    • MD5

      df3a1a0c571e06dbf9e9f228872b9825

    • SHA1

      b3915508ea8ef4392bb50317a6686e26a47b7f21

    • SHA256

      3686e746ce7172063ac3b749b5f98a3e86e422dca03472a5feba9871dd65bb5d

    • SHA512

      0582b9d2c0ba09dee5357d4ddb7d15ee7d2178a1165a4168a6a874703e8c5b8f521450d66eb66b74fe2a8f5e0bf25007cfc65f9d6559c65bcf07d940db0e5df4

    • SSDEEP

      12288:HMr9y90qXlWAXlb9ssmU4aAJBHrKYk7czBg+Nc:+yHWcssZ4aAJBLKX7cNg+Nc

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • Mystic family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks