General

  • Target

    42aed74af72a642b952053e20504009df2872fddd1de55218aa9e89b3426b885

  • Size

    167KB

  • Sample

    221125-16kc8sag56

  • MD5

    6a94a4e3527df402262f107808151912

  • SHA1

    b15f74212b1deb0467449d71dfd861f5f451b18d

  • SHA256

    42aed74af72a642b952053e20504009df2872fddd1de55218aa9e89b3426b885

  • SHA512

    ed596ab03158c78dc27a6736f7ae6403c8b70aed20f73073b6da4d8d17ee533804a0f693ce66df1edef0fa676575ee795f565fc434d15a384ab0a63cbe6b9d47

  • SSDEEP

    3072:TQ9aPFUzFUulC8S55iYBzvNnUCv9zvT+dHSjOc2m2t:Ka9uemCdiYBzFnUCv9z7Fjox

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.134.65/o7VsjdSa2f/index.php

193.56.146.194/h49vlBP/index.php

Extracted

Family

redline

Botnet

KRIPT

C2

212.8.246.157:32348

Attributes
  • auth_value

    80ebe4bab7a98a7ce9c75989ff9f40b4

Targets

    • Target

      42aed74af72a642b952053e20504009df2872fddd1de55218aa9e89b3426b885

    • Size

      167KB

    • MD5

      6a94a4e3527df402262f107808151912

    • SHA1

      b15f74212b1deb0467449d71dfd861f5f451b18d

    • SHA256

      42aed74af72a642b952053e20504009df2872fddd1de55218aa9e89b3426b885

    • SHA512

      ed596ab03158c78dc27a6736f7ae6403c8b70aed20f73073b6da4d8d17ee533804a0f693ce66df1edef0fa676575ee795f565fc434d15a384ab0a63cbe6b9d47

    • SSDEEP

      3072:TQ9aPFUzFUulC8S55iYBzvNnUCv9zvT+dHSjOc2m2t:Ka9uemCdiYBzFnUCv9z7Fjox

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks