General

  • Target

    Setup_soft.exe

  • Size

    6.4MB

  • Sample

    230123-x1h2fage91

  • MD5

    34ed962ae522fd0a6327b23fa8932cf2

  • SHA1

    20bddced3bf506f535efe74cdd32ddf44a159352

  • SHA256

    1a2de110248c93889768657273bdab9972b89b6b0dac8b2c83cdf2f5d45f80f6

  • SHA512

    2a47fcef7c88dbd072de0e9e17d45c4663c1ede05ad881ec3772dc6af30eb07fe40d0a912d91a94c9b5cf7b4399c1a67503e2c6a58c07f2814e8f8e97eb2e444

  • SSDEEP

    98304:Y5I5x3omArylYOI5CAaT+dPas2Yv0zcBWc1fldTRwaykXf1:15xqyoaT+dPB2mwq7T5bXf

Malware Config

Extracted

Family

amadey

Version

3.65

C2

83.217.11.7/8vcWxwwx3/index.php

Extracted

Family

redline

C2

95.217.146.176:4281

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Targets

    • Target

      Setup_soft.exe

    • Size

      6.4MB

    • MD5

      34ed962ae522fd0a6327b23fa8932cf2

    • SHA1

      20bddced3bf506f535efe74cdd32ddf44a159352

    • SHA256

      1a2de110248c93889768657273bdab9972b89b6b0dac8b2c83cdf2f5d45f80f6

    • SHA512

      2a47fcef7c88dbd072de0e9e17d45c4663c1ede05ad881ec3772dc6af30eb07fe40d0a912d91a94c9b5cf7b4399c1a67503e2c6a58c07f2814e8f8e97eb2e444

    • SSDEEP

      98304:Y5I5x3omArylYOI5CAaT+dPas2Yv0zcBWc1fldTRwaykXf1:15xqyoaT+dPB2mwq7T5bXf

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks