General

  • Target

    file.exe

  • Size

    778KB

  • Sample

    230210-l3cfwshc8s

  • MD5

    acf3f011cffe50e51cab718167ecc4a6

  • SHA1

    bcc44acd3f44e22ff6897961779036bc58be0c97

  • SHA256

    c821fa7f9d5cd7613eace1b6330f5a92439ae5764b40497c60bf2308ce968708

  • SHA512

    be3904c415f032d505b3e3c5556a770be4d8c47e00ab640245a29e9cf0bdd0c5e2177ac330eca02390bfa4176ff0fa9d74f6cd1a82ce0be1f621840f7d0fe2be

  • SSDEEP

    12288:mMrJy90mN7+1Y1uWScSTYGNPHGmY/OE3a0GIoj9dPg9RJ3dsngb0ILzzW27RmF:Lyta1CuNzYt2E3QIu+9JsYz7RmF

Malware Config

Extracted

Family

redline

Botnet

dubna

C2

193.233.20.11:4131

Attributes
  • auth_value

    f324b1269094b7462e56bab025f032f4

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Targets

    • Target

      file.exe

    • Size

      778KB

    • MD5

      acf3f011cffe50e51cab718167ecc4a6

    • SHA1

      bcc44acd3f44e22ff6897961779036bc58be0c97

    • SHA256

      c821fa7f9d5cd7613eace1b6330f5a92439ae5764b40497c60bf2308ce968708

    • SHA512

      be3904c415f032d505b3e3c5556a770be4d8c47e00ab640245a29e9cf0bdd0c5e2177ac330eca02390bfa4176ff0fa9d74f6cd1a82ce0be1f621840f7d0fe2be

    • SSDEEP

      12288:mMrJy90mN7+1Y1uWScSTYGNPHGmY/OE3a0GIoj9dPg9RJ3dsngb0ILzzW27RmF:Lyta1CuNzYt2E3QIu+9JsYz7RmF

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks