General

  • Target

    b64e8eabf80fa115d768b803a66a6d3b1548f9be895a2d4bbd1f85ce1e8f8b31

  • Size

    186KB

  • Sample

    221122-bs8fgahe7w

  • MD5

    4d13f383911f8b5a2a932de5e2c7c875

  • SHA1

    bc0644879928c2c0349553cf1a5e8150205ac8d9

  • SHA256

    b64e8eabf80fa115d768b803a66a6d3b1548f9be895a2d4bbd1f85ce1e8f8b31

  • SHA512

    7c769a2ce65ad0988f0789e31de14d304ebd6ad78ec9cd8f0769df8c2a8183c6fd6c877dca374b087d44fd550f76dafcd21ea983c704868ff6384229faaae825

  • SSDEEP

    3072:SlnQ+PdnyyWaJ9+g5EP8W2ENcxHOmMlJVbmGlqR/Z:S93nb7JmRcxumCVyGlI/

Malware Config

Extracted

Family

redline

Botnet

KRIPT

C2

212.8.246.157:32348

Attributes
  • auth_value

    80ebe4bab7a98a7ce9c75989ff9f40b4

Extracted

Family

amadey

Version

3.50

C2

193.56.146.174/g84kvj4jck/index.php

Targets

    • Target

      b64e8eabf80fa115d768b803a66a6d3b1548f9be895a2d4bbd1f85ce1e8f8b31

    • Size

      186KB

    • MD5

      4d13f383911f8b5a2a932de5e2c7c875

    • SHA1

      bc0644879928c2c0349553cf1a5e8150205ac8d9

    • SHA256

      b64e8eabf80fa115d768b803a66a6d3b1548f9be895a2d4bbd1f85ce1e8f8b31

    • SHA512

      7c769a2ce65ad0988f0789e31de14d304ebd6ad78ec9cd8f0769df8c2a8183c6fd6c877dca374b087d44fd550f76dafcd21ea983c704868ff6384229faaae825

    • SSDEEP

      3072:SlnQ+PdnyyWaJ9+g5EP8W2ENcxHOmMlJVbmGlqR/Z:S93nb7JmRcxumCVyGlI/

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks