General

  • Target

    66bcfe765a7e4f1bc8004ba5df06963a82ddc5782c7e2504fa656cef6db80412

  • Size

    987KB

  • Sample

    230303-1ccrasah8y

  • MD5

    bc86e0b436b550d19b31681c40b42909

  • SHA1

    e1d5f5da378e9ae8c61e5368c1e146bfe3255506

  • SHA256

    66bcfe765a7e4f1bc8004ba5df06963a82ddc5782c7e2504fa656cef6db80412

  • SHA512

    f50e4ec0da29b744c8ad1e3e7581f082f78613f23749354c0bf8b5f65b341afa8ae3e57d7691d2b91be6b0fa4ab8935bf852e0f678c1fa419625bf54616b66c0

  • SSDEEP

    24576:dya5s9mkKMGclzGtSNxDI4rcCGFQIERTj6IC2Zgfct8hb:4a5suxc0o3DZclERTjk2+fcA

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Targets

    • Target

      66bcfe765a7e4f1bc8004ba5df06963a82ddc5782c7e2504fa656cef6db80412

    • Size

      987KB

    • MD5

      bc86e0b436b550d19b31681c40b42909

    • SHA1

      e1d5f5da378e9ae8c61e5368c1e146bfe3255506

    • SHA256

      66bcfe765a7e4f1bc8004ba5df06963a82ddc5782c7e2504fa656cef6db80412

    • SHA512

      f50e4ec0da29b744c8ad1e3e7581f082f78613f23749354c0bf8b5f65b341afa8ae3e57d7691d2b91be6b0fa4ab8935bf852e0f678c1fa419625bf54616b66c0

    • SSDEEP

      24576:dya5s9mkKMGclzGtSNxDI4rcCGFQIERTj6IC2Zgfct8hb:4a5suxc0o3DZclERTjk2+fcA

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks