General

  • Target

    63ea38b48171e6957b82c687d409f9a6d2b355c3024674033474d29e208d5990

  • Size

    690KB

  • Sample

    230306-p21nwacd27

  • MD5

    8886e084e7efb8029edf022da83a7198

  • SHA1

    b792226bb7e434a0d7278043f02d68d2b0125a69

  • SHA256

    63ea38b48171e6957b82c687d409f9a6d2b355c3024674033474d29e208d5990

  • SHA512

    3d3c82aa3c8834636e04e8c555ea76e5eeb20a2da5f56eb2a492dedf0e0caa78ca9e6c1518a7b9e397b4768e6861bb580b61cf5b59021a20f49dea8bd575e883

  • SSDEEP

    12288:9Mryy90mOM/6+bzEDdqCZMbAhVxa7q1b98BgrLxr1/BQTGzI9sTW5:byIJ+vuxMbOA7M2g/zBsGRq5

Malware Config

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Targets

    • Target

      63ea38b48171e6957b82c687d409f9a6d2b355c3024674033474d29e208d5990

    • Size

      690KB

    • MD5

      8886e084e7efb8029edf022da83a7198

    • SHA1

      b792226bb7e434a0d7278043f02d68d2b0125a69

    • SHA256

      63ea38b48171e6957b82c687d409f9a6d2b355c3024674033474d29e208d5990

    • SHA512

      3d3c82aa3c8834636e04e8c555ea76e5eeb20a2da5f56eb2a492dedf0e0caa78ca9e6c1518a7b9e397b4768e6861bb580b61cf5b59021a20f49dea8bd575e883

    • SSDEEP

      12288:9Mryy90mOM/6+bzEDdqCZMbAhVxa7q1b98BgrLxr1/BQTGzI9sTW5:byIJ+vuxMbOA7M2g/zBsGRq5

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks