General

  • Target

    1ba028487eb5211d096b9b0966eab10dc167735fdaa955b2009e867331ca4797

  • Size

    602KB

  • Sample

    230203-hsrw2scc66

  • MD5

    d7ef23ae00d0fd408acc17dab19ebf85

  • SHA1

    fdd0d2ac72c5accf4858215e2971aed46af627d1

  • SHA256

    1ba028487eb5211d096b9b0966eab10dc167735fdaa955b2009e867331ca4797

  • SHA512

    97d3c86217b4bb33dc1fe8292139394cd45b7c03b05c259ad8bcced54d7e36af690ab8f00014d8437f0558966d300a565e99152835d91e24c68fe466f3f57e80

  • SSDEEP

    12288:NTMMeowvPMxTx3kjc4jr1OHYSGAaLsT0idkR:NgcwvPokLr4YS+LsT/k

Malware Config

Extracted

Family

redline

Botnet

redko

C2

62.204.41.170:4179

Attributes
  • auth_value

    9bcf7b0620ff067017d66b9a5d80b547

Extracted

Family

amadey

Version

3.66

C2

193.233.20.4/t6r48nSa/index.php

Extracted

Family

redline

Botnet

mixo

C2

176.113.115.16:4122

Attributes
  • auth_value

    f8c6749529d254a59e80682dd4ba63f6

Targets

    • Target

      1ba028487eb5211d096b9b0966eab10dc167735fdaa955b2009e867331ca4797

    • Size

      602KB

    • MD5

      d7ef23ae00d0fd408acc17dab19ebf85

    • SHA1

      fdd0d2ac72c5accf4858215e2971aed46af627d1

    • SHA256

      1ba028487eb5211d096b9b0966eab10dc167735fdaa955b2009e867331ca4797

    • SHA512

      97d3c86217b4bb33dc1fe8292139394cd45b7c03b05c259ad8bcced54d7e36af690ab8f00014d8437f0558966d300a565e99152835d91e24c68fe466f3f57e80

    • SSDEEP

      12288:NTMMeowvPMxTx3kjc4jr1OHYSGAaLsT0idkR:NgcwvPokLr4YS+LsT/k

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks