General

  • Target

    192e88e390afbdafb38d4273d5031deb.exe

  • Size

    241KB

  • Sample

    221104-v4ahcsbcaj

  • MD5

    192e88e390afbdafb38d4273d5031deb

  • SHA1

    8a9b778f7142c65d99aad99cc3753b8ec95919fc

  • SHA256

    593505e03743f43ae5b3d0ed815fc0416f55b5bed2ac1bbf13f95f6214a2fc9a

  • SHA512

    9e61e55651af48eac6039ec8215dcd20fcc44a8d45712dcedb3465b92f82ff260c2e55468217d412cfa348d8fcfb5b7988b54f3f9db49c67d858c637315ff900

  • SSDEEP

    6144:3BizIWRzBISIiLaliSMrf5ujpmzqaw5LiS:3a/axMNujpcqaw4S

Malware Config

Extracted

Family

redline

Botnet

bred

C2

77.73.134.251:4691

Attributes
  • auth_value

    0e8ad10c690c62fa90b012542647f121

Targets

    • Target

      192e88e390afbdafb38d4273d5031deb.exe

    • Size

      241KB

    • MD5

      192e88e390afbdafb38d4273d5031deb

    • SHA1

      8a9b778f7142c65d99aad99cc3753b8ec95919fc

    • SHA256

      593505e03743f43ae5b3d0ed815fc0416f55b5bed2ac1bbf13f95f6214a2fc9a

    • SHA512

      9e61e55651af48eac6039ec8215dcd20fcc44a8d45712dcedb3465b92f82ff260c2e55468217d412cfa348d8fcfb5b7988b54f3f9db49c67d858c637315ff900

    • SSDEEP

      6144:3BizIWRzBISIiLaliSMrf5ujpmzqaw5LiS:3a/axMNujpcqaw4S

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks