General

  • Target

    file

  • Size

    330KB

  • Sample

    221104-mbpgtaeca2

  • MD5

    3b7f1f21a9cfb5a0820c958dbc0f33e8

  • SHA1

    202361a82830d356e451b4cd13644fc11019698a

  • SHA256

    f39827c562a49e91fd3899f0eef1b312a6d858aa8608d84fc8b7ad38271e8853

  • SHA512

    f2fb3a855261c7b8c84395ede35b5381110d7c621f32d539140cd4e8bbad4149fb63f70872de5542c270bb9c596f3735f4b60aa5f7fc996b91d7cdc655a6fc07

  • SSDEEP

    3072:gzeIjpqL9sL7ApaKkE5rmmyqwGh3jc7jmD7pl2i04ffhp5XxNL1JqZzue3kF1JW:CjpImLMsKk2RyqLzdPRdVXLesTF1JW

Malware Config

Extracted

Family

redline

Botnet

bred

C2

77.73.134.251:4691

Attributes
  • auth_value

    0e8ad10c690c62fa90b012542647f121

Targets

    • Target

      file

    • Size

      330KB

    • MD5

      3b7f1f21a9cfb5a0820c958dbc0f33e8

    • SHA1

      202361a82830d356e451b4cd13644fc11019698a

    • SHA256

      f39827c562a49e91fd3899f0eef1b312a6d858aa8608d84fc8b7ad38271e8853

    • SHA512

      f2fb3a855261c7b8c84395ede35b5381110d7c621f32d539140cd4e8bbad4149fb63f70872de5542c270bb9c596f3735f4b60aa5f7fc996b91d7cdc655a6fc07

    • SSDEEP

      3072:gzeIjpqL9sL7ApaKkE5rmmyqwGh3jc7jmD7pl2i04ffhp5XxNL1JqZzue3kF1JW:CjpImLMsKk2RyqLzdPRdVXLesTF1JW

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks