General

  • Target

    3dc1c1de83ddd291986d507f56617268e817d1057b2bbbef664568d2aa644d6c

  • Size

    857KB

  • Sample

    230303-hj4jgsga2w

  • MD5

    5933d10c7dcf3adcbb803b1d4316c1e7

  • SHA1

    25ba5a31fc5eff7a6bb7e6931277d33c05054811

  • SHA256

    3dc1c1de83ddd291986d507f56617268e817d1057b2bbbef664568d2aa644d6c

  • SHA512

    d46363d0c9dbc6a9742340d51016564f1cbda810cddc444017e6497098c166ff7f44dd921f37d8587b8a89ce69fee71c8cc1a78217d5aac7da7915ac1ca6400e

  • SSDEEP

    24576:FymUzrQPpgYht1TcFWalCy35C4ejP7nuD3fiztWeu:gmUzof1TcpCYgWrit

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

amadey

Version

3.68

C2

193.233.20.25/buH5N004d/index.php

Targets

    • Target

      3dc1c1de83ddd291986d507f56617268e817d1057b2bbbef664568d2aa644d6c

    • Size

      857KB

    • MD5

      5933d10c7dcf3adcbb803b1d4316c1e7

    • SHA1

      25ba5a31fc5eff7a6bb7e6931277d33c05054811

    • SHA256

      3dc1c1de83ddd291986d507f56617268e817d1057b2bbbef664568d2aa644d6c

    • SHA512

      d46363d0c9dbc6a9742340d51016564f1cbda810cddc444017e6497098c166ff7f44dd921f37d8587b8a89ce69fee71c8cc1a78217d5aac7da7915ac1ca6400e

    • SSDEEP

      24576:FymUzrQPpgYht1TcFWalCy35C4ejP7nuD3fiztWeu:gmUzof1TcpCYgWrit

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks