General

  • Target

    file.exe

  • Size

    660KB

  • Sample

    230204-bf3z8aca54

  • MD5

    10ea41fd11c557045c27e5c2c6c2e7ba

  • SHA1

    edaaa8fb82e0aeb17e75a6b2d151433cc03751fd

  • SHA256

    ba6f1f7315c383583acb3caf2f7a74c89d3977cbf5ee19bb8bcc1a1455dc9317

  • SHA512

    156d85b7f430e404e46148c33c61ddb2da09c7b96db02f6921b0929d918d8dacf47a489c2535b7dfb70c4e489c230b579aba03084abcb77cf2518431a97fd980

  • SSDEEP

    12288:0G7Fy909rmBsLOCgFSiYBwwSP43mjc+I3/VWPbajAw3TJDuQTJyNiwF/NJi5LTg8:fyirmYOCw1YMg3m+/VS+p35BdGF/sLF

Malware Config

Extracted

Family

redline

Botnet

redko

C2

62.204.41.170:4179

Attributes
  • auth_value

    9bcf7b0620ff067017d66b9a5d80b547

Extracted

Family

redline

Botnet

gonka

C2

62.204.41.170:4179

Attributes
  • auth_value

    f017b1096da5cc257f8ca109051c5fbb

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

62.204.41.88/9vdVVVjsw/index.php

Extracted

Family

redline

Botnet

temposs6678

C2

82.115.223.9:15486

Attributes
  • auth_value

    af399e6a2fe66f67025541cf71c64313

Extracted

Family

redline

Botnet

Flow!

C2

45.66.230.190:28356

Attributes
  • auth_value

    529267838bbc2c78e754e9ca2dd2e0f0

Targets

    • Target

      file.exe

    • Size

      660KB

    • MD5

      10ea41fd11c557045c27e5c2c6c2e7ba

    • SHA1

      edaaa8fb82e0aeb17e75a6b2d151433cc03751fd

    • SHA256

      ba6f1f7315c383583acb3caf2f7a74c89d3977cbf5ee19bb8bcc1a1455dc9317

    • SHA512

      156d85b7f430e404e46148c33c61ddb2da09c7b96db02f6921b0929d918d8dacf47a489c2535b7dfb70c4e489c230b579aba03084abcb77cf2518431a97fd980

    • SSDEEP

      12288:0G7Fy909rmBsLOCgFSiYBwwSP43mjc+I3/VWPbajAw3TJDuQTJyNiwF/NJi5LTg8:fyirmYOCw1YMg3m+/VS+p35BdGF/sLF

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks