General

  • Target

    9c78bf1043caab3a8afab7ec078a520df9dc46875e5bc85c3e8c844c99643c54

  • Size

    690KB

  • Sample

    230306-plefpsbf5v

  • MD5

    29cc2f557b513e60509c8fe1acf11d16

  • SHA1

    47c2171274d901743c00b6253c94feb239aac286

  • SHA256

    9c78bf1043caab3a8afab7ec078a520df9dc46875e5bc85c3e8c844c99643c54

  • SHA512

    d51ebc73d6300cd89207fba757cf7022bbfe84e3e43e6c63d80e600fe684e4d33a20e14c7d424e859ca9e44bc4a62f9108a571455ed2ab83a3ee4b11005bee44

  • SSDEEP

    12288:2Mrwy90CII5ik7/wsi4kasMT1eX+hIxVOoNb9NBsfssu+IkEKWdcgF:qyVEgNiGVMB/Ocdy8+IkEKW9

Malware Config

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Targets

    • Target

      9c78bf1043caab3a8afab7ec078a520df9dc46875e5bc85c3e8c844c99643c54

    • Size

      690KB

    • MD5

      29cc2f557b513e60509c8fe1acf11d16

    • SHA1

      47c2171274d901743c00b6253c94feb239aac286

    • SHA256

      9c78bf1043caab3a8afab7ec078a520df9dc46875e5bc85c3e8c844c99643c54

    • SHA512

      d51ebc73d6300cd89207fba757cf7022bbfe84e3e43e6c63d80e600fe684e4d33a20e14c7d424e859ca9e44bc4a62f9108a571455ed2ab83a3ee4b11005bee44

    • SSDEEP

      12288:2Mrwy90CII5ik7/wsi4kasMT1eX+hIxVOoNb9NBsfssu+IkEKWdcgF:qyVEgNiGVMB/Ocdy8+IkEKW9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks