General

  • Target

    a4c8835b5e8d760d335d4454d7c2483ecbcb89512d304af6865976cc05a43612

  • Size

    2.1MB

  • Sample

    230210-kav7vsch25

  • MD5

    9a9806187e61f000ff9aaff8f177a4f7

  • SHA1

    0dd78f17503d0c4942a39162ca781c9a76d702b4

  • SHA256

    a4c8835b5e8d760d335d4454d7c2483ecbcb89512d304af6865976cc05a43612

  • SHA512

    a887fd15db05b0ba4c42bfcb15f00937aa1ec87369e9c5c6ed0d099674dc93d1a0477222f9c7225c1ef0b3d7addcd3707eb0339b90147408108b3413c8845759

  • SSDEEP

    49152:/0jPZDnyL6A3QCtO8dsCqYlQxIoz2I7ulWqLas:8xk6AgF8mbYq2dICN

Malware Config

Extracted

Family

redline

Botnet

fuka

C2

193.233.20.11:4131

Attributes
  • auth_value

    90eef520554ef188793d77ecc34217bf

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

Targets

    • Target

      a4c8835b5e8d760d335d4454d7c2483ecbcb89512d304af6865976cc05a43612

    • Size

      2.1MB

    • MD5

      9a9806187e61f000ff9aaff8f177a4f7

    • SHA1

      0dd78f17503d0c4942a39162ca781c9a76d702b4

    • SHA256

      a4c8835b5e8d760d335d4454d7c2483ecbcb89512d304af6865976cc05a43612

    • SHA512

      a887fd15db05b0ba4c42bfcb15f00937aa1ec87369e9c5c6ed0d099674dc93d1a0477222f9c7225c1ef0b3d7addcd3707eb0339b90147408108b3413c8845759

    • SSDEEP

      49152:/0jPZDnyL6A3QCtO8dsCqYlQxIoz2I7ulWqLas:8xk6AgF8mbYq2dICN

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks