General

  • Target

    605ee56d4abe01b063830371262fffdf.exe

  • Size

    721KB

  • Sample

    230215-asxtasgf7x

  • MD5

    605ee56d4abe01b063830371262fffdf

  • SHA1

    c50167374591db5034b429d320e72a0d5331d582

  • SHA256

    e7f1eabaf0e5b09ebaeb423c807186eff97e948e33d1b196058b42e1ab7134c6

  • SHA512

    e6acd27366f63ce86a3fa96379b2be931c1fc89bd9b3f6641873812bcfee50649cbd4c43aa1de834e2e51beaec08e67321cf31f28a0df053cfdfa840df937d37

  • SSDEEP

    12288:+MrDy90b/5sS7EoNt8ufnEKoSTzo5pJpp0zEKPsfelEQF:Ry0/iS7XN5oSTzu10zEcdlEQF

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Extracted

Family

amadey

Version

3.66

C2

193.233.20.4/t6r48nSa/index.php

Targets

    • Target

      605ee56d4abe01b063830371262fffdf.exe

    • Size

      721KB

    • MD5

      605ee56d4abe01b063830371262fffdf

    • SHA1

      c50167374591db5034b429d320e72a0d5331d582

    • SHA256

      e7f1eabaf0e5b09ebaeb423c807186eff97e948e33d1b196058b42e1ab7134c6

    • SHA512

      e6acd27366f63ce86a3fa96379b2be931c1fc89bd9b3f6641873812bcfee50649cbd4c43aa1de834e2e51beaec08e67321cf31f28a0df053cfdfa840df937d37

    • SSDEEP

      12288:+MrDy90b/5sS7EoNt8ufnEKoSTzo5pJpp0zEKPsfelEQF:Ry0/iS7XN5oSTzu10zEcdlEQF

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks