General

  • Target

    477922325633bfc1def1ea2d953349f4e417896d7f49e067fe6bc5de05ab7698

  • Size

    561KB

  • Sample

    250221-3ce8jasncv

  • MD5

    70dc58001691e2262a8061d57893789a

  • SHA1

    532f97b6a9090396f778f3ce3248f7585066a098

  • SHA256

    477922325633bfc1def1ea2d953349f4e417896d7f49e067fe6bc5de05ab7698

  • SHA512

    d7ddadbca5c7ad7db627e559c5f952586c28e9873b62e7706d34b6e1ede2ebace4bb1aaec9fabb756fefcff4396060d73586132510ed16584cd8eaac473e8240

  • SSDEEP

    12288:VMrcy90awy7S8NxqrvtEmiLcXi4iE+01Ib/nSZ:Vybwy7hUv5kcXv3+e1Z

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Targets

    • Target

      477922325633bfc1def1ea2d953349f4e417896d7f49e067fe6bc5de05ab7698

    • Size

      561KB

    • MD5

      70dc58001691e2262a8061d57893789a

    • SHA1

      532f97b6a9090396f778f3ce3248f7585066a098

    • SHA256

      477922325633bfc1def1ea2d953349f4e417896d7f49e067fe6bc5de05ab7698

    • SHA512

      d7ddadbca5c7ad7db627e559c5f952586c28e9873b62e7706d34b6e1ede2ebace4bb1aaec9fabb756fefcff4396060d73586132510ed16584cd8eaac473e8240

    • SSDEEP

      12288:VMrcy90awy7S8NxqrvtEmiLcXi4iE+01Ib/nSZ:Vybwy7hUv5kcXv3+e1Z

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • Mystic family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks