General

  • Target

    0x000600000000072d-163.dat

  • Size

    236KB

  • Sample

    230203-w45tyaca4y

  • MD5

    fde8915d251fada3a37530421eb29dcf

  • SHA1

    44386a8947ddfab993409945dae05a772a13e047

  • SHA256

    6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

  • SHA512

    ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

  • SSDEEP

    6144:+VSoYbL/MOFBtDe+1T9uA/qruVy5NghHgVO:NoH3+uA+uVy5NAqO

Malware Config

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

62.204.41.88/9vdVVVjsw/index.php

Extracted

Family

redline

Botnet

gonka

C2

62.204.41.170:4179

Attributes
  • auth_value

    f017b1096da5cc257f8ca109051c5fbb

Extracted

Family

redline

Botnet

bigdick

C2

185.254.37.212:80

Attributes
  • auth_value

    88290259fe8dc49da48b125d03e6788c

Extracted

Family

redline

C2

85.31.44.66:17742

Attributes
  • auth_value

    e9a89e5b72a729171b1655add99ee280

Targets

    • Target

      0x000600000000072d-163.dat

    • Size

      236KB

    • MD5

      fde8915d251fada3a37530421eb29dcf

    • SHA1

      44386a8947ddfab993409945dae05a772a13e047

    • SHA256

      6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

    • SHA512

      ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

    • SSDEEP

      6144:+VSoYbL/MOFBtDe+1T9uA/qruVy5NghHgVO:NoH3+uA+uVy5NAqO

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Smokeloader packer

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks