General

  • Target

    file.exe

  • Size

    715KB

  • Sample

    230214-hcbvwsag4w

  • MD5

    be7731c16de3cedc82b0da034754a078

  • SHA1

    625e99015f49790547da678910b45ec8e3305411

  • SHA256

    d76b24903d109697c5a5928577549ca30f628a1b95b404887d9eeb56aef79b76

  • SHA512

    51fa002f18f192ba42154e8d06abd4617f183147f6bd50c1d8e6cf50bcc3be589bb2fa05049af8dc7a6b935ca2d7eb27eca80cfbf71cd70e9fd50e6d3fcf80dd

  • SSDEEP

    12288:9Mrty90YZHQ4U3LR9Yl/e69Gj6IgFx4Iawz88O2yQBuAR2P8iY:UyzVQR9E2r1I7NZj2P4

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

amadey

Version

3.66

C2

193.233.20.2/Bn89hku/index.php

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      file.exe

    • Size

      715KB

    • MD5

      be7731c16de3cedc82b0da034754a078

    • SHA1

      625e99015f49790547da678910b45ec8e3305411

    • SHA256

      d76b24903d109697c5a5928577549ca30f628a1b95b404887d9eeb56aef79b76

    • SHA512

      51fa002f18f192ba42154e8d06abd4617f183147f6bd50c1d8e6cf50bcc3be589bb2fa05049af8dc7a6b935ca2d7eb27eca80cfbf71cd70e9fd50e6d3fcf80dd

    • SSDEEP

      12288:9Mrty90YZHQ4U3LR9Yl/e69Gj6IgFx4Iawz88O2yQBuAR2P8iY:UyzVQR9E2r1I7NZj2P4

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks