General

  • Target

    afe494d055c66df34f16570866d4b05d.exe

  • Size

    715KB

  • Sample

    230214-keregabd2t

  • MD5

    afe494d055c66df34f16570866d4b05d

  • SHA1

    f6cb4b8fcc62df6d76d5fa804075d9400b5574c7

  • SHA256

    c377412e532d521c503048de70f69df4ca865f6f53901f269acbcbe86d727514

  • SHA512

    00bbaa989c55ea410ce3fe14772e09928c55815c291544b7caf4b4a2d79c9e3ee6e52a1b15673e4fc8262723693eca9f3e233b961f7a4ae11fc4f1b440eca895

  • SSDEEP

    12288:HMr/y90uM/bx5g1Org+TvDoxJRYY27EguoDKEa:wyO61Org+TvDoLRYbgUM

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Targets

    • Target

      afe494d055c66df34f16570866d4b05d.exe

    • Size

      715KB

    • MD5

      afe494d055c66df34f16570866d4b05d

    • SHA1

      f6cb4b8fcc62df6d76d5fa804075d9400b5574c7

    • SHA256

      c377412e532d521c503048de70f69df4ca865f6f53901f269acbcbe86d727514

    • SHA512

      00bbaa989c55ea410ce3fe14772e09928c55815c291544b7caf4b4a2d79c9e3ee6e52a1b15673e4fc8262723693eca9f3e233b961f7a4ae11fc4f1b440eca895

    • SSDEEP

      12288:HMr/y90uM/bx5g1Org+TvDoxJRYY27EguoDKEa:wyO61Org+TvDoLRYbgUM

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks