General

  • Target

    849467c22e3ffe0ef6c8a0976e94465b3782763a3878d6292e1356959fa10aaa

  • Size

    986KB

  • Sample

    230304-lbef6sch5x

  • MD5

    e2e04a84ed4d9a03ff4ebbc86f81b086

  • SHA1

    7a983cc943067c4fc032e59a0d8adc7471c5ebde

  • SHA256

    849467c22e3ffe0ef6c8a0976e94465b3782763a3878d6292e1356959fa10aaa

  • SHA512

    2a697fdc335193e98331d64aa5108d431acfb1a71057832a06321b49d39a24f0d8546b1a583d3204093a6376f08d34c534527451c750bb89d009f9a8e3bf878a

  • SSDEEP

    24576:EysVDwq7XuEU85OpPMFzn5VIOzj9vyMZZC1ETYBt:TsVDwqd35eMFkY5yMzC1E

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Targets

    • Target

      849467c22e3ffe0ef6c8a0976e94465b3782763a3878d6292e1356959fa10aaa

    • Size

      986KB

    • MD5

      e2e04a84ed4d9a03ff4ebbc86f81b086

    • SHA1

      7a983cc943067c4fc032e59a0d8adc7471c5ebde

    • SHA256

      849467c22e3ffe0ef6c8a0976e94465b3782763a3878d6292e1356959fa10aaa

    • SHA512

      2a697fdc335193e98331d64aa5108d431acfb1a71057832a06321b49d39a24f0d8546b1a583d3204093a6376f08d34c534527451c750bb89d009f9a8e3bf878a

    • SSDEEP

      24576:EysVDwq7XuEU85OpPMFzn5VIOzj9vyMZZC1ETYBt:TsVDwqd35eMFkY5yMzC1E

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks