General

  • Target

    e6c6569a66256fc40bcbc3ded95a27998f5d1b0387f91099e9e97cdad4bdeecd.zip

  • Size

    617KB

  • Sample

    230308-mg7wcafe29

  • MD5

    a5593e3a0924da014a3f6aa25da6b2f4

  • SHA1

    6d03476e90cc08935451910dc5ec4088b03e0c8f

  • SHA256

    d9d5c3e54ccbe46ce84f2facaae145b381fc4882136ae84da6ea5ad1d95baa0c

  • SHA512

    a679bd1e653e1d9e80e79ec18eff2186cc79f771508ef78e5058107fcf09e1f3422d15aba701d1a0f4dc7a774014c13242db6e05439a253cecfc98c4cba8c4ab

  • SSDEEP

    12288:qeehEPiEqwhLVTqSZwx7xW4mZbotxNVSR899tt6cCV8MuYGnxvt01tf31:q/hEPiEpV2VgPlkVj7t6LoxvQ1

Malware Config

Extracted

Family

redline

Botnet

misha

C2

193.56.146.11:4173

Attributes
  • auth_value

    e17e441c954db214b94a603a7b0b1aea

Extracted

Family

amadey

Version

3.68

C2

193.56.146.218/images/IMG_489440/index.php

Targets

    • Target

      e6c6569a66256fc40bcbc3ded95a27998f5d1b0387f91099e9e97cdad4bdeecd.exe

    • Size

      740KB

    • MD5

      906f7577992ba49c57c8e1e4f345b9fd

    • SHA1

      d817e6ef82dcc6acbfd122c2e3eebddc24243306

    • SHA256

      e6c6569a66256fc40bcbc3ded95a27998f5d1b0387f91099e9e97cdad4bdeecd

    • SHA512

      3be79eb580442801389f5b1a0aad8cc40b2c91d32162e3bc4bc0623352d3ce926ff8a0d162b7d45116202066c15f10810742c59ad9578908c5cac8a571286c09

    • SSDEEP

      12288:FNZj3wKaxKRs1jLX+Mcd+c4huYBc0+Tj+4SWvC3sJMHsag60FUUZ/4Grxizao2uh:1UB1n7Iczc0QqSKC0sWUHt4HGEh

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks