General

  • Target

    file.exe

  • Size

    235KB

  • Sample

    230124-r8pw3acb92

  • MD5

    eadc21381dc709d986659834e2e4061b

  • SHA1

    864eab0d7bd119a7e8158babfda4ca8967c139c6

  • SHA256

    43c5942d24457766b0b38d2bf8c78c96fc0389bf06d6f061aa77482e3c64d3ab

  • SHA512

    a738868aa3c39b850300a514a8d91ebe94cfc101918304958ceeebc0f65ac8c3176a173f36824769a146a7bcbf1662bcc946dc45d6e6ce8eadb2295379bf8bca

  • SSDEEP

    6144:gSRg+A7AZGFDubDXagraG0JzSRuVyLWNg5PQqgE:gPsEjgwJ4uVyCNmPJ

Malware Config

Extracted

Family

amadey

Version

3.66

C2

62.204.41.89/8bcZfjw/index.php

Extracted

Family

redline

Botnet

nonem

C2

62.204.41.159:4062

Attributes
  • auth_value

    e6c5903bd2c2eaaf10cbbfd1fb675712

Extracted

Family

redline

Botnet

temp777777777777

C2

82.115.223.9:15486

Attributes
  • auth_value

    39fa6f6612a4320728bfb830f0e86553

Extracted

Family

redline

Botnet

ringa

C2

62.204.41.159:4062

Attributes
  • auth_value

    a55a3a033d3867d474f0b150e8e5ec10

Extracted

Family

redline

Botnet

st1

C2

librchichelpai.shop:81

rniwondunuifac.shop:81

Attributes
  • auth_value

    a7232a45d6034ee2454fc434093d8f12

Targets

    • Target

      file.exe

    • Size

      235KB

    • MD5

      eadc21381dc709d986659834e2e4061b

    • SHA1

      864eab0d7bd119a7e8158babfda4ca8967c139c6

    • SHA256

      43c5942d24457766b0b38d2bf8c78c96fc0389bf06d6f061aa77482e3c64d3ab

    • SHA512

      a738868aa3c39b850300a514a8d91ebe94cfc101918304958ceeebc0f65ac8c3176a173f36824769a146a7bcbf1662bcc946dc45d6e6ce8eadb2295379bf8bca

    • SSDEEP

      6144:gSRg+A7AZGFDubDXagraG0JzSRuVyLWNg5PQqgE:gPsEjgwJ4uVyCNmPJ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect rhadamanthys stealer shellcode

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks