General

  • Target

    efd709599177711407cbf090d5828fcd.bin

  • Size

    1.1MB

  • Sample

    230212-b8zhhaba26

  • MD5

    7db5aed1b7b02d9616fc4fe1085c9b33

  • SHA1

    4e690ea057be92825063465d2dd612d291882095

  • SHA256

    da3d0238b82c210b9632f9ea475e061036dd9901ab87a821265e07d1786b54b3

  • SHA512

    6dc68248694298021a2afd393c65c26e84fe488b865b272dfa78742b5ced0ad447023bef1d575545f6bff44e6aa1f3f2ce4ff7c1d1168b9ba1edbc634b168722

  • SSDEEP

    24576:oH8m6U/xiQ2NXyVaezH70/La6k2BiHANZqROrnIxFZVOjqrNhFK2C:oHd60xivNCVaez16FBsANZqkTcZ2qrNO

Malware Config

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      6509ef9d3d0f59c8df5d7077b7ff5a5c909b0225091292e7118ffb818f4edf65.exe

    • Size

      1.1MB

    • MD5

      efd709599177711407cbf090d5828fcd

    • SHA1

      2d900e4800e87a8c873559250bd508e22d76a07f

    • SHA256

      6509ef9d3d0f59c8df5d7077b7ff5a5c909b0225091292e7118ffb818f4edf65

    • SHA512

      d695d4694b1145ada9d518ea2808880787adf18760fe9a6e15b411c34001181598e5257e7c6a3523650506523c554123668cd604f68783c379d62f635250630b

    • SSDEEP

      24576:9yQ1VaiVedPHDSGxOJsCJKmX7/n/9MaqLIwEWw7Jz1i:YQ1giVMSGxObbL/+v7EWwL

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks