General

  • Target

    bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387

  • Size

    373KB

  • Sample

    241102-r3bggsxaqc

  • MD5

    54d2dcca449229bc210b853b0a52bdc5

  • SHA1

    07b9e5e210c362612268757ea4b640a1120ede24

  • SHA256

    bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387

  • SHA512

    17b401edb54f5524630e9a5957b7b4141ed6638a9f1051be3d08e7b568e40a61f520280023ea2ef2aac2233858946ad47107fcc5e010800f13e16e48fa5faa8c

  • SSDEEP

    6144:KJy+bnr+1p0yN90QEvuWi9trCxH4MTtIg/kDKb1CXnlH6ThA03uS1QUrT:7MrJy90INuYO5jAl+A031D

Malware Config

Extracted

Family

redline

Botnet

rwan

C2

77.91.124.73:19071

Attributes
  • auth_value

    7c40eda5da4f888d6f61befbf947d9fe

Targets

    • Target

      bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387

    • Size

      373KB

    • MD5

      54d2dcca449229bc210b853b0a52bdc5

    • SHA1

      07b9e5e210c362612268757ea4b640a1120ede24

    • SHA256

      bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387

    • SHA512

      17b401edb54f5524630e9a5957b7b4141ed6638a9f1051be3d08e7b568e40a61f520280023ea2ef2aac2233858946ad47107fcc5e010800f13e16e48fa5faa8c

    • SSDEEP

      6144:KJy+bnr+1p0yN90QEvuWi9trCxH4MTtIg/kDKb1CXnlH6ThA03uS1QUrT:7MrJy90INuYO5jAl+A031D

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • Mystic family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks