General

  • Target

    0a14d9c7260ba23dbcee9cd93869b565a6087639caa4f9801d3b8acdaa1e0c1a

  • Size

    982KB

  • Sample

    230304-htj8ladb66

  • MD5

    854451b9ef341d57a2195a90718bc1c0

  • SHA1

    8e6e4fa1e068bcd0a85f4c085365668ce14539d5

  • SHA256

    0a14d9c7260ba23dbcee9cd93869b565a6087639caa4f9801d3b8acdaa1e0c1a

  • SHA512

    3cf12fa9e1cdd9a0051eab919651f367cbc63979c28e0d02793e47df512bc03c5736eb1d9360ad11f35e03fc65520f2d80144bfd7633a404df0ea17bb4b60d21

  • SSDEEP

    24576:iyUAfVoh5oAxlLFffh+dT0aYXHp/ISckxva:JUAfVWKAxlLj20aEp/ISTt

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Targets

    • Target

      0a14d9c7260ba23dbcee9cd93869b565a6087639caa4f9801d3b8acdaa1e0c1a

    • Size

      982KB

    • MD5

      854451b9ef341d57a2195a90718bc1c0

    • SHA1

      8e6e4fa1e068bcd0a85f4c085365668ce14539d5

    • SHA256

      0a14d9c7260ba23dbcee9cd93869b565a6087639caa4f9801d3b8acdaa1e0c1a

    • SHA512

      3cf12fa9e1cdd9a0051eab919651f367cbc63979c28e0d02793e47df512bc03c5736eb1d9360ad11f35e03fc65520f2d80144bfd7633a404df0ea17bb4b60d21

    • SSDEEP

      24576:iyUAfVoh5oAxlLFffh+dT0aYXHp/ISckxva:JUAfVWKAxlLj20aEp/ISTt

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks