General

  • Target

    2c2fa5a4633a2542f903f593268bcb6d306e5b62c807bb293a4b41c355f94c13

  • Size

    739KB

  • Sample

    230211-tpcthaad9w

  • MD5

    8cab72f5de9ab7255d42e5a721c8c4e1

  • SHA1

    c360caaba662212bf340bbbb9983c02a2adb0e65

  • SHA256

    2c2fa5a4633a2542f903f593268bcb6d306e5b62c807bb293a4b41c355f94c13

  • SHA512

    c9e563f07e7497d7dd7c4b1033b705d5e7061ee38183db77eb0d86f3f0c08a82c74e4b8c573b178f89a8afa2a652fc6b8b80ebe0d4219347872d812ee264a881

  • SSDEEP

    12288:CMray90+yVaDXIAf3cqnFAKBJl88G7LIPLZm9FBjBSDoxBW/pwToasJ:kyQVeXI8sm88G7LIzYIDoxI/aToasJ

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

Targets

    • Target

      2c2fa5a4633a2542f903f593268bcb6d306e5b62c807bb293a4b41c355f94c13

    • Size

      739KB

    • MD5

      8cab72f5de9ab7255d42e5a721c8c4e1

    • SHA1

      c360caaba662212bf340bbbb9983c02a2adb0e65

    • SHA256

      2c2fa5a4633a2542f903f593268bcb6d306e5b62c807bb293a4b41c355f94c13

    • SHA512

      c9e563f07e7497d7dd7c4b1033b705d5e7061ee38183db77eb0d86f3f0c08a82c74e4b8c573b178f89a8afa2a652fc6b8b80ebe0d4219347872d812ee264a881

    • SSDEEP

      12288:CMray90+yVaDXIAf3cqnFAKBJl88G7LIPLZm9FBjBSDoxBW/pwToasJ:kyQVeXI8sm88G7LIzYIDoxI/aToasJ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks