General

  • Target

    395f9dcf0d0f6d92c7d1518f2744231547b8dadf08cee577ea9c3022b63c95b1

  • Size

    1.1MB

  • Sample

    230225-bavfwsbd3x

  • MD5

    d52dc205c21da0950a3ab469a8af98ec

  • SHA1

    2c8c66a17b3575d72e2f0bcd86e11bc1c906dc5a

  • SHA256

    395f9dcf0d0f6d92c7d1518f2744231547b8dadf08cee577ea9c3022b63c95b1

  • SHA512

    74282edc9b1e845090ec9d64cee06125f4ea5dda11585f3fcd4b75fd3a85ea01c483afc47d752fd363263dcd8ac3a8b7e4b82a6e05f80b50ce15612d8379012b

  • SSDEEP

    24576:hyRY971ZlMaYDa87tsIaPTfYK9FIlSQbKKjY1p14LGld51i5jxld4Ba4M:USBsamaACzYKglSAAld3i5xld

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://evilextractor.com/wp-content/uploads/2022/12/Python39-322.zip

exe.dropper

https://evilextractor.com/wp-content/uploads/2023/02/Parameter.zip

exe.dropper

https://github.com/tedburke/CommandCam/archive/refs/heads/master.zip

Extracted

Family

redline

Botnet

rodik

C2

193.233.20.23:4124

Attributes
  • auth_value

    59b6e22e7cfd9b5fa0c99d1942f7c85d

Extracted

Family

amadey

Version

3.67

C2

193.233.20.15/dF30Hn4m/index.php

Extracted

Family

amadey

Version

3.66

C2

62.204.41.88/9vdVVVjsw/index.php

Extracted

Family

aurora

C2

212.87.204.93:8081

Extracted

Family

redline

Botnet

frukt

C2

193.233.20.23:4124

Attributes
  • auth_value

    06c91230f673ef9b659f23ab41313be0

Targets

    • Target

      395f9dcf0d0f6d92c7d1518f2744231547b8dadf08cee577ea9c3022b63c95b1

    • Size

      1.1MB

    • MD5

      d52dc205c21da0950a3ab469a8af98ec

    • SHA1

      2c8c66a17b3575d72e2f0bcd86e11bc1c906dc5a

    • SHA256

      395f9dcf0d0f6d92c7d1518f2744231547b8dadf08cee577ea9c3022b63c95b1

    • SHA512

      74282edc9b1e845090ec9d64cee06125f4ea5dda11585f3fcd4b75fd3a85ea01c483afc47d752fd363263dcd8ac3a8b7e4b82a6e05f80b50ce15612d8379012b

    • SSDEEP

      24576:hyRY971ZlMaYDa87tsIaPTfYK9FIlSQbKKjY1p14LGld51i5jxld4Ba4M:USBsamaACzYKglSAAld3i5xld

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks