General

  • Target

    Setup_soft.exe

  • Size

    7.0MB

  • Sample

    230124-a87y7sgb82

  • MD5

    6e1e121b326c1fbacdbbfa31dfa9fe2c

  • SHA1

    61a755cb930c4ce7b8aab7106b0aa7b08b427b92

  • SHA256

    79403994107dccd355ddf6638cc191b60f05a8b7760a6fc02bf00548a13cd3f3

  • SHA512

    c1d5d073bf679d8fe3de6e5f681fe0f382ef1d79d6a153e5bf18cd4d166a577b30f493e8e1b7c7063d25e990337dbc5f621efc31db6e88a10be95df43394a98f

  • SSDEEP

    98304:Y5I5x3omArylYOI5CAaT+dPas2Yv0zcBWc1fldTRwaykXf1Dt4:15xqyoaT+dPB2mwq7T5bXfA

Malware Config

Extracted

Family

amadey

Version

3.65

C2

83.217.11.7/8vcWxwwx3/index.php

Extracted

Family

redline

C2

95.217.146.176:4281

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Targets

    • Target

      Setup_soft.exe

    • Size

      7.0MB

    • MD5

      6e1e121b326c1fbacdbbfa31dfa9fe2c

    • SHA1

      61a755cb930c4ce7b8aab7106b0aa7b08b427b92

    • SHA256

      79403994107dccd355ddf6638cc191b60f05a8b7760a6fc02bf00548a13cd3f3

    • SHA512

      c1d5d073bf679d8fe3de6e5f681fe0f382ef1d79d6a153e5bf18cd4d166a577b30f493e8e1b7c7063d25e990337dbc5f621efc31db6e88a10be95df43394a98f

    • SSDEEP

      98304:Y5I5x3omArylYOI5CAaT+dPas2Yv0zcBWc1fldTRwaykXf1Dt4:15xqyoaT+dPB2mwq7T5bXfA

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks