General

  • Target

    file.exe

  • Size

    273KB

  • Sample

    221218-jn9fzaba53

  • MD5

    d46c0ef86073fef77a0f587441c73e2f

  • SHA1

    fad64a8689695d57f9ee1f1420027c2d0946c6c5

  • SHA256

    eecfb2caccc6cdc631c31df60a317dcac6c29f9d9145e665906a4f23c7d130f6

  • SHA512

    3f64e1017518da9f4ac6ce58a28f58555c18ddad51db2bff3575a2c90f42cff1af7b7983b9285867e347c637a3f48d3f54c19f92f57f298a7e3b5e2cd77d87e2

  • SSDEEP

    6144:xkdGVLWvs/bZGiPjNWacggVNx9OI11/hmg3CwsU0VB:xkd+6SVGO7cggt99pRSwBO

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://cdn.discordapp.com/attachments/1049569242455998544/1049862157858242560/string4633.err

Extracted

Family

amadey

Version

3.50

C2

31.41.244.237/jg94cVd30f/index.php

Extracted

Family

amadey

Version

3.61

C2

62.204.41.79/r8Bsje3/index.php

Extracted

Family

amadey

Version

3.60

C2

62.204.41.13/gjend7w/index.php

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/asdfedfe8/

Extracted

Family

redline

Botnet

nokia

C2

31.41.244.198:4083

Attributes
  • auth_value

    3b38e056d594ae0cf1368e6e1daa3a4e

Targets

    • Target

      file.exe

    • Size

      273KB

    • MD5

      d46c0ef86073fef77a0f587441c73e2f

    • SHA1

      fad64a8689695d57f9ee1f1420027c2d0946c6c5

    • SHA256

      eecfb2caccc6cdc631c31df60a317dcac6c29f9d9145e665906a4f23c7d130f6

    • SHA512

      3f64e1017518da9f4ac6ce58a28f58555c18ddad51db2bff3575a2c90f42cff1af7b7983b9285867e347c637a3f48d3f54c19f92f57f298a7e3b5e2cd77d87e2

    • SSDEEP

      6144:xkdGVLWvs/bZGiPjNWacggVNx9OI11/hmg3CwsU0VB:xkd+6SVGO7cggt99pRSwBO

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks