General

  • Target

    608b6c0630d3f2c0f7a63d9dd56fc1f2b1b9f0b316aee3a394d80b025cdff3a9

  • Size

    316KB

  • Sample

    221122-gen3kabg64

  • MD5

    cd1dae8b164dcdd0389dbec60bf16b7b

  • SHA1

    6164f0e2a465f2bff61c2a15bb0e5f20f977a3d6

  • SHA256

    608b6c0630d3f2c0f7a63d9dd56fc1f2b1b9f0b316aee3a394d80b025cdff3a9

  • SHA512

    96097c3902f0eaa784f084a3eed90140533ad0b85c072080e3ee6542a8f06d9bcc197f7ba1071e76a239a4ee56a9f80aa9356482f577284ebcbdbdfbbe8f6d5f

  • SSDEEP

    6144:8UKVEIQMuBvcESEEVY9NsMDmshnkf8+CwbG:OpQP0V6zc8wG

Malware Config

Extracted

Family

redline

Botnet

KRIPT

C2

212.8.246.157:32348

Attributes
  • auth_value

    80ebe4bab7a98a7ce9c75989ff9f40b4

Extracted

Family

amadey

Version

3.50

C2

193.56.146.174/g84kvj4jck/index.php

Targets

    • Target

      608b6c0630d3f2c0f7a63d9dd56fc1f2b1b9f0b316aee3a394d80b025cdff3a9

    • Size

      316KB

    • MD5

      cd1dae8b164dcdd0389dbec60bf16b7b

    • SHA1

      6164f0e2a465f2bff61c2a15bb0e5f20f977a3d6

    • SHA256

      608b6c0630d3f2c0f7a63d9dd56fc1f2b1b9f0b316aee3a394d80b025cdff3a9

    • SHA512

      96097c3902f0eaa784f084a3eed90140533ad0b85c072080e3ee6542a8f06d9bcc197f7ba1071e76a239a4ee56a9f80aa9356482f577284ebcbdbdfbbe8f6d5f

    • SSDEEP

      6144:8UKVEIQMuBvcESEEVY9NsMDmshnkf8+CwbG:OpQP0V6zc8wG

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks