General

  • Target

    f3a23a23a3438d446f551ac0931b2ace6e0bf3c4eb39af0ce47e5f51462d56a2

  • Size

    743KB

  • Sample

    230216-wg2trsah85

  • MD5

    78f3a7e4c7096868b4bbbc5f28ac7f0e

  • SHA1

    35dd5692d21b67ddd79c6598ba2a13e9fcef6255

  • SHA256

    f3a23a23a3438d446f551ac0931b2ace6e0bf3c4eb39af0ce47e5f51462d56a2

  • SHA512

    cdc0217e1a050ec97d5e75ecf69be49a61f118026179bc518c0c974f2a6c1f015e3cc8fe4ff016e6a10b9e1abab7b4d626394be3f6bd636f2033ed95282e1f86

  • SSDEEP

    12288:qMrQy90nQt0wxpFx4AQxgjMDsEuI/WlYvh8dQIK4FuayGpXC+WHJMrB1+R:eyAQtN4A3jmsEdYqy9jFpXC+WHJEB10

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Extracted

Family

amadey

Version

3.66

C2

193.233.20.4/t6r48nSa/index.php

Targets

    • Target

      f3a23a23a3438d446f551ac0931b2ace6e0bf3c4eb39af0ce47e5f51462d56a2

    • Size

      743KB

    • MD5

      78f3a7e4c7096868b4bbbc5f28ac7f0e

    • SHA1

      35dd5692d21b67ddd79c6598ba2a13e9fcef6255

    • SHA256

      f3a23a23a3438d446f551ac0931b2ace6e0bf3c4eb39af0ce47e5f51462d56a2

    • SHA512

      cdc0217e1a050ec97d5e75ecf69be49a61f118026179bc518c0c974f2a6c1f015e3cc8fe4ff016e6a10b9e1abab7b4d626394be3f6bd636f2033ed95282e1f86

    • SSDEEP

      12288:qMrQy90nQt0wxpFx4AQxgjMDsEuI/WlYvh8dQIK4FuayGpXC+WHJMrB1+R:eyAQtN4A3jmsEdYqy9jFpXC+WHJEB10

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks