General

  • Target

    7261c5dcf4e8420569863932a818a98a1a092b6f88c6e081674d62e962b8b466

  • Size

    244KB

  • Sample

    221123-mcx6cadg42

  • MD5

    4be7950712e4301045cd4ea92ec6f54a

  • SHA1

    c2ca3c1f075b3de0e08da837ad9b301ea6007d50

  • SHA256

    7261c5dcf4e8420569863932a818a98a1a092b6f88c6e081674d62e962b8b466

  • SHA512

    173820dd4022ea4ce3c8b2dd662900b3f7e563695a30f8e0f9386403d510d4017a266f0e08eae634cadecf5a94527aa6a8736d13b154b2e4c2fbc1af383c8575

  • SSDEEP

    3072:KqBJndrlxXL2KkIWUalD65WguCv0thE/5ELD+vhJC8Lz7KL5ey1enrudx9KCG793:jntL2KkI3ahmh13CioMCEuZGJ

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.174/g84kvj4jck/index.php

Extracted

Family

redline

Botnet

novr

C2

31.41.244.14:4694

Attributes
  • auth_value

    34ddf4eb9326256f20a48cd5f1e9b496

Targets

    • Target

      7261c5dcf4e8420569863932a818a98a1a092b6f88c6e081674d62e962b8b466

    • Size

      244KB

    • MD5

      4be7950712e4301045cd4ea92ec6f54a

    • SHA1

      c2ca3c1f075b3de0e08da837ad9b301ea6007d50

    • SHA256

      7261c5dcf4e8420569863932a818a98a1a092b6f88c6e081674d62e962b8b466

    • SHA512

      173820dd4022ea4ce3c8b2dd662900b3f7e563695a30f8e0f9386403d510d4017a266f0e08eae634cadecf5a94527aa6a8736d13b154b2e4c2fbc1af383c8575

    • SSDEEP

      3072:KqBJndrlxXL2KkIWUalD65WguCv0thE/5ELD+vhJC8Lz7KL5ey1enrudx9KCG793:jntL2KkI3ahmh13CioMCEuZGJ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks