General

  • Target

    0edce30ea91681466907df3cb6334efd.bin

  • Size

    639KB

  • Sample

    230308-bctmdacf6t

  • MD5

    6b5ed144c93b7a2b02b2e697fb9681b0

  • SHA1

    2ed3e616f4f3579b3acd039f107b76e3f2a908a4

  • SHA256

    5e2d3c4c6090605a4a3d259650f187d86a07ad640cd9495f7b27d7d56a2593f2

  • SHA512

    1ef0ba28d1644909a203aba442e0c349d488222f06eb9e2045786e3c19d11f4ae9f2e3b1beecc9b8ab7f62227fcc08b154e55be8f218c105b0a67532e6b94dfc

  • SSDEEP

    12288:bPB+PdqTZIp2L3okXyunUa7ok87AzJDa90VS4OFd5mLKnGYBWYx5OIIznX4wdrYV:XacL4UnfzoaPIyL8HDd6/6V

Malware Config

Extracted

Family

amadey

Version

3.68

C2

193.233.20.26/Do3m4Gor/index.php

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Targets

    • Target

      b22c116ff5f7fbd7d3ccbea075c84eaba0cd1b3dce5effa9a284730a345c2b1c.exe

    • Size

      690KB

    • MD5

      0edce30ea91681466907df3cb6334efd

    • SHA1

      89589cf7142d1a5b9f78e1578c545cee1c224f77

    • SHA256

      b22c116ff5f7fbd7d3ccbea075c84eaba0cd1b3dce5effa9a284730a345c2b1c

    • SHA512

      dfbf9c6f0ed8d189d13f779d801001f4fef8651464430371f0c668ccf678fc7d605ed8d4bd7571fb9f52049ee1fe9d73c681bd222c4f1655bb56553b421d17bd

    • SSDEEP

      12288:0Mrty90+edwi3ijm7mWdGAqN7bI+wN9RDDHEyksPdfaGnEWgvo6lT:pyO7i67m1AqN7bI+Obkyk+rE7dZ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks