General

  • Target

    94658d225e89f77741c0353c2d5c8ab135cf2b8cac0f54689009e102e41106e5

  • Size

    985KB

  • Sample

    230304-j625lsdd52

  • MD5

    27552b2a6a93f4a7ab52bed43a3a737b

  • SHA1

    b3d5747d4a739ed4e5fa6fc2b1b69a0e30d9fcb8

  • SHA256

    94658d225e89f77741c0353c2d5c8ab135cf2b8cac0f54689009e102e41106e5

  • SHA512

    19d975be040e88d879ee787f8005658ad28034b7ec133fcedac4ba2467850e377b401c91ef6655e9f0695080309624cea0440149a9a7c89fd1b2844bcdb9078a

  • SSDEEP

    24576:CyK9h5pC1+aaM+ZnvJLLx2PxHUViwIe2MN+gr:pK9hG1FwvVt4HUVFr2u+

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Targets

    • Target

      94658d225e89f77741c0353c2d5c8ab135cf2b8cac0f54689009e102e41106e5

    • Size

      985KB

    • MD5

      27552b2a6a93f4a7ab52bed43a3a737b

    • SHA1

      b3d5747d4a739ed4e5fa6fc2b1b69a0e30d9fcb8

    • SHA256

      94658d225e89f77741c0353c2d5c8ab135cf2b8cac0f54689009e102e41106e5

    • SHA512

      19d975be040e88d879ee787f8005658ad28034b7ec133fcedac4ba2467850e377b401c91ef6655e9f0695080309624cea0440149a9a7c89fd1b2844bcdb9078a

    • SSDEEP

      24576:CyK9h5pC1+aaM+ZnvJLLx2PxHUViwIe2MN+gr:pK9hG1FwvVt4HUVFr2u+

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks