General

  • Target

    31b7f9be62dd14d15a718eac28557308625816ec79790d16e394e58bdebc6916

  • Size

    797KB

  • Sample

    230211-azbjmseg9y

  • MD5

    cbbfe8e6ce1aece43f69a854d328db56

  • SHA1

    da049d877aa5517e7eff8aa15a58d3aace9c2726

  • SHA256

    31b7f9be62dd14d15a718eac28557308625816ec79790d16e394e58bdebc6916

  • SHA512

    6c7b732bf3e9affe646afec6e89a75cf95421089115e75e7d5467aedf4cd136e20f041f8ef66f397049711ab5d54cdd0832eab69bfc0f8aeec2c18f7788eac9c

  • SSDEEP

    24576:JyuPBhn7TXiDAPii5uy886v8IhNH0224CZjvzov0voArn:8ynXzn8860yV0OIj7ZoAr

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

Targets

    • Target

      31b7f9be62dd14d15a718eac28557308625816ec79790d16e394e58bdebc6916

    • Size

      797KB

    • MD5

      cbbfe8e6ce1aece43f69a854d328db56

    • SHA1

      da049d877aa5517e7eff8aa15a58d3aace9c2726

    • SHA256

      31b7f9be62dd14d15a718eac28557308625816ec79790d16e394e58bdebc6916

    • SHA512

      6c7b732bf3e9affe646afec6e89a75cf95421089115e75e7d5467aedf4cd136e20f041f8ef66f397049711ab5d54cdd0832eab69bfc0f8aeec2c18f7788eac9c

    • SSDEEP

      24576:JyuPBhn7TXiDAPii5uy886v8IhNH0224CZjvzov0voArn:8ynXzn8860yV0OIj7ZoAr

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks