General

  • Target

    5afa2cfa1315d681e56305d5295ada1c64433956729e0acef8f604f8860c5a57

  • Size

    715KB

  • Sample

    230212-2csm7agd2w

  • MD5

    83e7746fba5b410bc91d814f7c58d291

  • SHA1

    d2cd4c94e53c52cfb70e6120aff51c9d4b815738

  • SHA256

    5afa2cfa1315d681e56305d5295ada1c64433956729e0acef8f604f8860c5a57

  • SHA512

    4bc0ca5ad9d89e169242c32803f6e2201bfc911f0d6e69fb9da60be1933fb7b9379b4a0ab8f7034f1a8802f53156a13303878a09f34bf7a0bac5bf3f10b349f1

  • SSDEEP

    12288:CMrfSy90KYuUeYV9SjBdtyMbk7qI8vFh9Hg/cfsneJcxqpLztCCjfR0r9NoqzSpT:oyOuUnVw3tyMbG+vFHcC4cLh7SRRSpT

Malware Config

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Targets

    • Target

      5afa2cfa1315d681e56305d5295ada1c64433956729e0acef8f604f8860c5a57

    • Size

      715KB

    • MD5

      83e7746fba5b410bc91d814f7c58d291

    • SHA1

      d2cd4c94e53c52cfb70e6120aff51c9d4b815738

    • SHA256

      5afa2cfa1315d681e56305d5295ada1c64433956729e0acef8f604f8860c5a57

    • SHA512

      4bc0ca5ad9d89e169242c32803f6e2201bfc911f0d6e69fb9da60be1933fb7b9379b4a0ab8f7034f1a8802f53156a13303878a09f34bf7a0bac5bf3f10b349f1

    • SSDEEP

      12288:CMrfSy90KYuUeYV9SjBdtyMbk7qI8vFh9Hg/cfsneJcxqpLztCCjfR0r9NoqzSpT:oyOuUnVw3tyMbG+vFHcC4cLh7SRRSpT

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks