General

  • Target

    34532f862c001878203a4c5f8f2b7efa5c47084ebaf7ca26d906099d753e2471

  • Size

    891KB

  • Sample

    230303-bbmgnsff39

  • MD5

    e322c1b3f19ed48d5ee29c56c6409f6e

  • SHA1

    4f9d68de3888e8576d194d78246ca68e00850675

  • SHA256

    34532f862c001878203a4c5f8f2b7efa5c47084ebaf7ca26d906099d753e2471

  • SHA512

    d82c35c9b0632249c90b8c1af030356ff664e53b854ae7ef8c6e254b764553ea913449d001be320e9e37ba0a736366d5909e038b29db18595553f8d73f35b5a5

  • SSDEEP

    24576:PyxiP+XdtCYEdiaa8VTYXQqas+XjhOENVDLyx:a5dtCYEza8Vfqas+Xdt

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

amadey

Version

3.68

C2

193.233.20.25/buH5N004d/index.php

Targets

    • Target

      34532f862c001878203a4c5f8f2b7efa5c47084ebaf7ca26d906099d753e2471

    • Size

      891KB

    • MD5

      e322c1b3f19ed48d5ee29c56c6409f6e

    • SHA1

      4f9d68de3888e8576d194d78246ca68e00850675

    • SHA256

      34532f862c001878203a4c5f8f2b7efa5c47084ebaf7ca26d906099d753e2471

    • SHA512

      d82c35c9b0632249c90b8c1af030356ff664e53b854ae7ef8c6e254b764553ea913449d001be320e9e37ba0a736366d5909e038b29db18595553f8d73f35b5a5

    • SSDEEP

      24576:PyxiP+XdtCYEdiaa8VTYXQqas+XjhOENVDLyx:a5dtCYEza8Vfqas+Xdt

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks