General

  • Target

    e5a7c7a51e70abd06f7c83a493a2a75f48a14eae898fd49daa7aef157e2794b9

  • Size

    874KB

  • Sample

    230303-ttgm9ahg81

  • MD5

    cd8654d3dd95ddbb9a94cd646468866e

  • SHA1

    ef1cef24153df364c6635fdff32437a48e6451bc

  • SHA256

    e5a7c7a51e70abd06f7c83a493a2a75f48a14eae898fd49daa7aef157e2794b9

  • SHA512

    f3b749b58b7f8ac460f7b0a57c145b718d5cdfeed6b0c65c29b5358d1f4e868862a4c8e9f8b724f989bddf6a1c65476ab44f5e19be067f1a05fb9b1c3bee3e66

  • SSDEEP

    12288:2Mrvy90AkMIMl0E/A8pR3FbOQYZXa6lXk2+dpWh+S1AP5TxV:xyR1bl9vdFZ4XEdSG5VV

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Targets

    • Target

      e5a7c7a51e70abd06f7c83a493a2a75f48a14eae898fd49daa7aef157e2794b9

    • Size

      874KB

    • MD5

      cd8654d3dd95ddbb9a94cd646468866e

    • SHA1

      ef1cef24153df364c6635fdff32437a48e6451bc

    • SHA256

      e5a7c7a51e70abd06f7c83a493a2a75f48a14eae898fd49daa7aef157e2794b9

    • SHA512

      f3b749b58b7f8ac460f7b0a57c145b718d5cdfeed6b0c65c29b5358d1f4e868862a4c8e9f8b724f989bddf6a1c65476ab44f5e19be067f1a05fb9b1c3bee3e66

    • SSDEEP

      12288:2Mrvy90AkMIMl0E/A8pR3FbOQYZXa6lXk2+dpWh+S1AP5TxV:xyR1bl9vdFZ4XEdSG5VV

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks