General

  • Target

    ec84cc9018c5c31eb791e6bf91eaa84c88b7d57b80fa637ceccd062aa419e46f

  • Size

    247KB

  • Sample

    221125-k7vycsba5t

  • MD5

    24b4c7a0509d3f9a464ce3527db60c89

  • SHA1

    cf6de67ae26755b5d5f734f722a2e245e4e144a7

  • SHA256

    ec84cc9018c5c31eb791e6bf91eaa84c88b7d57b80fa637ceccd062aa419e46f

  • SHA512

    d4cdcbb6f3b0d1213cacd0828dcbc48be17c5d71965717b80c36c36ce0201e50811a228c0c79eac7ea1b55eeee77ff32d1c44786023f2722dd555637a83b5634

  • SSDEEP

    6144:i2s0+LRZuyb7hLKwDfEHIoNXk34z6YpXWu:i2n+Huyb1WwDfNoEYh

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.174/g84kvj4jck/index.php

Extracted

Family

redline

Botnet

ritchshit

C2

94.103.183.33:80

Attributes
  • auth_value

    98c1a18edcc6e04afa19a0ee3b16a6e2

Targets

    • Target

      ec84cc9018c5c31eb791e6bf91eaa84c88b7d57b80fa637ceccd062aa419e46f

    • Size

      247KB

    • MD5

      24b4c7a0509d3f9a464ce3527db60c89

    • SHA1

      cf6de67ae26755b5d5f734f722a2e245e4e144a7

    • SHA256

      ec84cc9018c5c31eb791e6bf91eaa84c88b7d57b80fa637ceccd062aa419e46f

    • SHA512

      d4cdcbb6f3b0d1213cacd0828dcbc48be17c5d71965717b80c36c36ce0201e50811a228c0c79eac7ea1b55eeee77ff32d1c44786023f2722dd555637a83b5634

    • SSDEEP

      6144:i2s0+LRZuyb7hLKwDfEHIoNXk34z6YpXWu:i2n+Huyb1WwDfNoEYh

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks