General

  • Target

    file.exe

  • Size

    719KB

  • Sample

    230212-mfczksch83

  • MD5

    f6c3529489c9b14e03cc0d5737262b81

  • SHA1

    cc633f31c664b6da84180c2521755413fe041ed1

  • SHA256

    14f00b3509a0ab5830b0a7e673c27d5032642741bf990312038ca2cb2068954d

  • SHA512

    5aa6a01fe5da9627de1ab03c1a3561d1806b0747501f578f858c698352bdb726ae2639520fed73a23a84d46c0e4a47b20cb10c68b23bc74be595423ba80959b4

  • SSDEEP

    12288:wMrQy90nZWVuDiFNuQu96UXdSeNeJgqdRDqBPsMG+uIwzhSu1l8nG7:wyFVii/uQVodS9gcSPsMG7lcuTd7

Malware Config

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      file.exe

    • Size

      719KB

    • MD5

      f6c3529489c9b14e03cc0d5737262b81

    • SHA1

      cc633f31c664b6da84180c2521755413fe041ed1

    • SHA256

      14f00b3509a0ab5830b0a7e673c27d5032642741bf990312038ca2cb2068954d

    • SHA512

      5aa6a01fe5da9627de1ab03c1a3561d1806b0747501f578f858c698352bdb726ae2639520fed73a23a84d46c0e4a47b20cb10c68b23bc74be595423ba80959b4

    • SSDEEP

      12288:wMrQy90nZWVuDiFNuQu96UXdSeNeJgqdRDqBPsMG+uIwzhSu1l8nG7:wyFVii/uQVodS9gcSPsMG7lcuTd7

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.