General

  • Target

    f95a5b5f768aa5a32c9b4aa8396f8cb638e66749edffb61f9fb4ca43b0fc7a6b

  • Size

    743KB

  • Sample

    230217-b61yjscg3z

  • MD5

    4b6804f6fe01810e6a6e6b7422df8b21

  • SHA1

    60a31e6f50108873a35fa62693000fee49a3670e

  • SHA256

    f95a5b5f768aa5a32c9b4aa8396f8cb638e66749edffb61f9fb4ca43b0fc7a6b

  • SHA512

    cd89c998d5e0ee0e9368b36457e29d780a3023906c826329abb5a1bfb9445759da58296b846ff26fe4c914eea3b51336d60328d413459bbeecc77d42c5735df3

  • SSDEEP

    12288:iMroy90i64sy5GMdOxR6aBwJ1Su+Yte6i4M/T8WPG/se:ayp6Pw3aB41SPYteYite/d

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Extracted

Family

amadey

Version

3.66

C2

193.233.20.4/t6r48nSa/index.php

Targets

    • Target

      f95a5b5f768aa5a32c9b4aa8396f8cb638e66749edffb61f9fb4ca43b0fc7a6b

    • Size

      743KB

    • MD5

      4b6804f6fe01810e6a6e6b7422df8b21

    • SHA1

      60a31e6f50108873a35fa62693000fee49a3670e

    • SHA256

      f95a5b5f768aa5a32c9b4aa8396f8cb638e66749edffb61f9fb4ca43b0fc7a6b

    • SHA512

      cd89c998d5e0ee0e9368b36457e29d780a3023906c826329abb5a1bfb9445759da58296b846ff26fe4c914eea3b51336d60328d413459bbeecc77d42c5735df3

    • SSDEEP

      12288:iMroy90i64sy5GMdOxR6aBwJ1Su+Yte6i4M/T8WPG/se:ayp6Pw3aB41SPYteYite/d

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks