General

  • Target

    e4c8ad200041b74b5f075f73c5530627b9ad87b2be1dd92ce80c76944d4863a7

  • Size

    725KB

  • Sample

    230216-geb31aga87

  • MD5

    f99632cf59d0b0951ed408040794ce49

  • SHA1

    f144aeef2f8df3e4f25c544f8d48923709ea5422

  • SHA256

    e4c8ad200041b74b5f075f73c5530627b9ad87b2be1dd92ce80c76944d4863a7

  • SHA512

    95c1bd4eda07e7eca84bfff353ff16235707bfa9807a403f2ef19bd086d7fadf16105ee631d8ab3d9d225cae1ce0238ff323f413097168073fcc3139e749279a

  • SSDEEP

    12288:cMr8y90A21ffcqNPOljerU+BOSLFRjF/uo5LVTIG5C2A4a1Fq2BMAebzBXtqadN:Yy0Jfcymli3Lnp/vLVTIh4hGerRv

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Extracted

Family

amadey

Version

3.66

C2

193.233.20.4/t6r48nSa/index.php

Targets

    • Target

      e4c8ad200041b74b5f075f73c5530627b9ad87b2be1dd92ce80c76944d4863a7

    • Size

      725KB

    • MD5

      f99632cf59d0b0951ed408040794ce49

    • SHA1

      f144aeef2f8df3e4f25c544f8d48923709ea5422

    • SHA256

      e4c8ad200041b74b5f075f73c5530627b9ad87b2be1dd92ce80c76944d4863a7

    • SHA512

      95c1bd4eda07e7eca84bfff353ff16235707bfa9807a403f2ef19bd086d7fadf16105ee631d8ab3d9d225cae1ce0238ff323f413097168073fcc3139e749279a

    • SSDEEP

      12288:cMr8y90A21ffcqNPOljerU+BOSLFRjF/uo5LVTIG5C2A4a1Fq2BMAebzBXtqadN:Yy0Jfcymli3Lnp/vLVTIh4hGerRv

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks