General

  • Target

    ebed7638ed1683139872218c9acfcf40e689f609f9d79dfdd60af3faa53897a6N

  • Size

    1.4MB

  • Sample

    241104-2myxysyfmg

  • MD5

    d33b7d13c5fb379d2a3817ecaa8bef20

  • SHA1

    cc4d43a964b2cd8b196791936a38eb39195fb5b5

  • SHA256

    ebed7638ed1683139872218c9acfcf40e689f609f9d79dfdd60af3faa53897a6

  • SHA512

    7b8513247feb0adecacd6210024141cac7a12d382cdaa93ab1e778c29f9f4904f11d0a86761dbd621053decc6feb0939f8cbaeffefa8621f2a2b7831c9eb55bb

  • SSDEEP

    24576:3yOvZtvSMg4248k6TPs8GcVE0ZketvxXnwbrtd5CYXaiFUVfCT0lfTI:CMtvSMg4L/6TPsh0me3gbr/kYqrVq4

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      ebed7638ed1683139872218c9acfcf40e689f609f9d79dfdd60af3faa53897a6N

    • Size

      1.4MB

    • MD5

      d33b7d13c5fb379d2a3817ecaa8bef20

    • SHA1

      cc4d43a964b2cd8b196791936a38eb39195fb5b5

    • SHA256

      ebed7638ed1683139872218c9acfcf40e689f609f9d79dfdd60af3faa53897a6

    • SHA512

      7b8513247feb0adecacd6210024141cac7a12d382cdaa93ab1e778c29f9f4904f11d0a86761dbd621053decc6feb0939f8cbaeffefa8621f2a2b7831c9eb55bb

    • SSDEEP

      24576:3yOvZtvSMg4248k6TPs8GcVE0ZketvxXnwbrtd5CYXaiFUVfCT0lfTI:CMtvSMg4L/6TPsh0me3gbr/kYqrVq4

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • Mystic family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks