General

  • Target

    5a26fcfe80b13039bdf5f70800f484a069fe650824182ba1b5e1032c5c6f6cd0

  • Size

    779KB

  • Sample

    230210-kw669aee98

  • MD5

    141218db67fa6bb68b1da015ed03a04e

  • SHA1

    97252980c68d682067171b268693f29446319a7d

  • SHA256

    5a26fcfe80b13039bdf5f70800f484a069fe650824182ba1b5e1032c5c6f6cd0

  • SHA512

    0c7a8338bb18842faa798f38d8e1ec73a1affac7a12dbd6e37e9feea8fad18126cca2b082fa531b71db2053845ce72c1328a5c5d52b0072000e89be696e7b9f3

  • SSDEEP

    12288:/Mruy90FZJoN7oednxoUHBJeEfzHHyq6qmn2TnageJlAobl+TQQ:1ySoJoedT+Ebnyq6Hn2bag2jbITV

Malware Config

Extracted

Family

redline

Botnet

dubna

C2

193.233.20.11:4131

Attributes
  • auth_value

    f324b1269094b7462e56bab025f032f4

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Targets

    • Target

      5a26fcfe80b13039bdf5f70800f484a069fe650824182ba1b5e1032c5c6f6cd0

    • Size

      779KB

    • MD5

      141218db67fa6bb68b1da015ed03a04e

    • SHA1

      97252980c68d682067171b268693f29446319a7d

    • SHA256

      5a26fcfe80b13039bdf5f70800f484a069fe650824182ba1b5e1032c5c6f6cd0

    • SHA512

      0c7a8338bb18842faa798f38d8e1ec73a1affac7a12dbd6e37e9feea8fad18126cca2b082fa531b71db2053845ce72c1328a5c5d52b0072000e89be696e7b9f3

    • SSDEEP

      12288:/Mruy90FZJoN7oednxoUHBJeEfzHHyq6qmn2TnageJlAobl+TQQ:1ySoJoedT+Ebnyq6Hn2bag2jbITV

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks