General

  • Target

    7586270050260053cd80b0d72636e2afbd103f8ea01eda13629ddb538eef4a2a

  • Size

    149KB

  • Sample

    221126-wq8nnsgd8t

  • MD5

    c9a9883edb0bb4c8b8c46ef058398e35

  • SHA1

    9b17ef8ccbc0205e87bf3110c7aab7b49d6cb2c9

  • SHA256

    7586270050260053cd80b0d72636e2afbd103f8ea01eda13629ddb538eef4a2a

  • SHA512

    f7437eb0e09f585fa5206faa290fae738823a427f00cdba5aa45fba4f0af6eca7ff43e9a590edc45c5fef333e294535d18a9c2cd7ce53355fb51bc05f0a6554a

  • SSDEEP

    3072:/gdolH4RSm55R8N8FMJpuWXTKmguU5gQDHi:6oaRXRE8FMJpuCTKGK1

Malware Config

Extracted

Family

redline

Botnet

KRIPT

C2

212.8.246.157:32348

Attributes
  • auth_value

    80ebe4bab7a98a7ce9c75989ff9f40b4

Extracted

Family

redline

Botnet

newlogs

C2

77.73.133.70:38819

Attributes
  • auth_value

    05a73a1692c3aebb2a26f1a593237a77

Extracted

Family

amadey

Version

3.50

C2

77.73.134.65/o7VsjdSa2f/index.php

Targets

    • Target

      7586270050260053cd80b0d72636e2afbd103f8ea01eda13629ddb538eef4a2a

    • Size

      149KB

    • MD5

      c9a9883edb0bb4c8b8c46ef058398e35

    • SHA1

      9b17ef8ccbc0205e87bf3110c7aab7b49d6cb2c9

    • SHA256

      7586270050260053cd80b0d72636e2afbd103f8ea01eda13629ddb538eef4a2a

    • SHA512

      f7437eb0e09f585fa5206faa290fae738823a427f00cdba5aa45fba4f0af6eca7ff43e9a590edc45c5fef333e294535d18a9c2cd7ce53355fb51bc05f0a6554a

    • SSDEEP

      3072:/gdolH4RSm55R8N8FMJpuWXTKmguU5gQDHi:6oaRXRE8FMJpuCTKGK1

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks