General

  • Target

    180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168

  • Size

    724KB

  • Sample

    230212-actrpsee8v

  • MD5

    e62f51cf3c50e5cc8cef37d69048a846

  • SHA1

    8ad20268c2ff44c916ce2bb0b8add3d9507d78b8

  • SHA256

    180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168

  • SHA512

    184409de4d8933b5bad34325099c7082f87ba7b74993df1aadb8fa03029ad0759e15450f15ceee2c93cce736461fcdd60e84b062f702f0a4289cc1960cff46da

  • SSDEEP

    12288:RMr4y90RNV1JMS5oUMjNNu2bJa25wjrk88dOyIPopXT1e5+TmtSGeGciZZ:1ySDMS5bMu2bJDw/k88dOyIQ5e5+T3GR

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

Targets

    • Target

      180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168

    • Size

      724KB

    • MD5

      e62f51cf3c50e5cc8cef37d69048a846

    • SHA1

      8ad20268c2ff44c916ce2bb0b8add3d9507d78b8

    • SHA256

      180ae9ad1bc6774bda3a88328f07c6ce7328cab039d8acbaec7b66d1eca4d168

    • SHA512

      184409de4d8933b5bad34325099c7082f87ba7b74993df1aadb8fa03029ad0759e15450f15ceee2c93cce736461fcdd60e84b062f702f0a4289cc1960cff46da

    • SSDEEP

      12288:RMr4y90RNV1JMS5oUMjNNu2bJa25wjrk88dOyIPopXT1e5+TmtSGeGciZZ:1ySDMS5bMu2bJDw/k88dOyIQ5e5+T3GR

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks