General

  • Target

    fa8d714ca215a27acddc46250299a89b13271630e1c9355e3687edf14c82e290

  • Size

    714KB

  • Sample

    230214-q74s6adc2x

  • MD5

    87a7c4ae9698916bab3ae2d8bb1f8366

  • SHA1

    728e1f2119d09613ed928b1fe827a13deb8ff82a

  • SHA256

    fa8d714ca215a27acddc46250299a89b13271630e1c9355e3687edf14c82e290

  • SHA512

    fb8d23d771863a5d6ea3ed4af5de3dd1534063e0b07b21a7acfae9d96d27edd6f1464b83d8a5ca159ad0047083149a18a19f10499c78c991b68c6cb0e9713415

  • SSDEEP

    12288:9MrVy90TSs1qHI1bceWKzr3awXMD5SNx5pyAPWAQJa2GTr2fko:wyRQbcez1cDkNxVzQEr2fj

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Extracted

Family

amadey

Version

3.66

C2

193.233.20.4/t6r48nSa/index.php

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Targets

    • Target

      fa8d714ca215a27acddc46250299a89b13271630e1c9355e3687edf14c82e290

    • Size

      714KB

    • MD5

      87a7c4ae9698916bab3ae2d8bb1f8366

    • SHA1

      728e1f2119d09613ed928b1fe827a13deb8ff82a

    • SHA256

      fa8d714ca215a27acddc46250299a89b13271630e1c9355e3687edf14c82e290

    • SHA512

      fb8d23d771863a5d6ea3ed4af5de3dd1534063e0b07b21a7acfae9d96d27edd6f1464b83d8a5ca159ad0047083149a18a19f10499c78c991b68c6cb0e9713415

    • SSDEEP

      12288:9MrVy90TSs1qHI1bceWKzr3awXMD5SNx5pyAPWAQJa2GTr2fko:wyRQbcez1cDkNxVzQEr2fj

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks