General

  • Target

    dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a

  • Size

    185KB

  • Sample

    221124-tw4wkaad3s

  • MD5

    955b9f8253053d0c87825ac9b634664b

  • SHA1

    5614644467c51e007049d8df1b4410b54e6dfc58

  • SHA256

    e7868adf9cefb014b481f3c29067695893455e210e1a25912912cc78bae432ea

  • SHA512

    3907aeb82028a9622b7b1f13f59c629217c10992e90ad1983d0670e302f482e4c34d1d7d51323a1f8a4b287b699b4cdb8e360a70b7a7476c204fd1500bc85455

  • SSDEEP

    3072:tuL4bt5HSJsZydIuD4uEEjpT2AbGzBhG2QI/OC+INzljGiFBQFJWJiUQ7x4Ay/:tjx5nNQREENT2yGzNQK3tG6QFJWIvy/

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Extracted

Family

redline

Botnet

Testing.v1

C2

185.106.92.111:2510

Attributes
  • auth_value

    336be733d6f6d74b812efad48d422273

Targets

    • Target

      dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a

    • Size

      244KB

    • MD5

      03e4f75c45659084bc8b63e7762d8969

    • SHA1

      a55603b1c70428da45c55cb94a2a8bfd2ec9dd24

    • SHA256

      dd30ca110d2c890977d45c7c68fefcf0c62e49f932fdd98cc9ecf2c4d285df2a

    • SHA512

      2bd10bd3313f0e8c653bc4851f0693934d5514f361710dd735e00c76e4fb723280d930e2520d5f7ac18c5ce5ac96515a40192681dabc6a447f5eff98988040a6

    • SSDEEP

      3072:5sWWuKJ/k/zv2UFWVLx8QFcP5wU3RE65BhG2QI/OCyINzljGiFBQbJWJiUQ7xBtT:ZWl/QWVLx8AdJ4NQK3pG6QbJWIvJRt

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks