General

  • Target

    63b70438fde72e8d893263a98316082bcf771421552d9d405cb3366b93e0dcd6

  • Size

    987KB

  • Sample

    230304-hg989adb43

  • MD5

    c0b3c7ce9a43be24386a668dbc548ea5

  • SHA1

    b7d5b0390cd8c870feafb9f8e642dcfc78ddacfe

  • SHA256

    63b70438fde72e8d893263a98316082bcf771421552d9d405cb3366b93e0dcd6

  • SHA512

    5e5b200442b9c77cb91bb0ff539a22de90ead3abc8f06eb50277739f756e19d5ddf1fb893ae1161f97a79d88b5a7061b6dff77cee86f7626410b2c2c50f7675f

  • SSDEEP

    24576:YyOQHmMflgpMbvm/NB0z+plzNxt4mZga+jBwQsI08rLgvb:fNmMflAM61Bhljtz+jBhseL6

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

amadey

Version

3.68

C2

193.233.20.25/buH5N004d/index.php

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Targets

    • Target

      63b70438fde72e8d893263a98316082bcf771421552d9d405cb3366b93e0dcd6

    • Size

      987KB

    • MD5

      c0b3c7ce9a43be24386a668dbc548ea5

    • SHA1

      b7d5b0390cd8c870feafb9f8e642dcfc78ddacfe

    • SHA256

      63b70438fde72e8d893263a98316082bcf771421552d9d405cb3366b93e0dcd6

    • SHA512

      5e5b200442b9c77cb91bb0ff539a22de90ead3abc8f06eb50277739f756e19d5ddf1fb893ae1161f97a79d88b5a7061b6dff77cee86f7626410b2c2c50f7675f

    • SSDEEP

      24576:YyOQHmMflgpMbvm/NB0z+plzNxt4mZga+jBwQsI08rLgvb:fNmMflAM61Bhljtz+jBhseL6

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks