General

  • Target

    f63ed22a15ca17b456bb033120d22e885d5688e9eed58f84b4809de730c125aa

  • Size

    714KB

  • Sample

    230213-d1hacsae66

  • MD5

    e58e43698027710d90b6586ed33fbff3

  • SHA1

    ad7cac087f0ab7c1ca625fcf8a991cb2f9228de0

  • SHA256

    f63ed22a15ca17b456bb033120d22e885d5688e9eed58f84b4809de730c125aa

  • SHA512

    3b446534a528188e7e8471ad4999ec3b3bc072246f30c5d87d65d1d4278f93752c27a3f21e94260d1914e376e6093bb815e05be9c88913a9bd031fb2ce6a07b6

  • SSDEEP

    12288:3Mriy90c09nsCoa0qaT8yfMwiJ1+bANeJ/kTjsxVgYAsS+aeLkObopPzZ:9yJ09sCon8yfLgs3XA/+aYkh

Malware Config

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Targets

    • Target

      f63ed22a15ca17b456bb033120d22e885d5688e9eed58f84b4809de730c125aa

    • Size

      714KB

    • MD5

      e58e43698027710d90b6586ed33fbff3

    • SHA1

      ad7cac087f0ab7c1ca625fcf8a991cb2f9228de0

    • SHA256

      f63ed22a15ca17b456bb033120d22e885d5688e9eed58f84b4809de730c125aa

    • SHA512

      3b446534a528188e7e8471ad4999ec3b3bc072246f30c5d87d65d1d4278f93752c27a3f21e94260d1914e376e6093bb815e05be9c88913a9bd031fb2ce6a07b6

    • SSDEEP

      12288:3Mriy90c09nsCoa0qaT8yfMwiJ1+bANeJ/kTjsxVgYAsS+aeLkObopPzZ:9yJ09sCon8yfLgs3XA/+aYkh

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks