General

  • Target

    07aed3277266aade5214c9046842ffee884998032b739b2579cf38c96f03d07c

  • Size

    730KB

  • Sample

    230309-rfw5nscg26

  • MD5

    e6fd0be5db872f1df456931294a21bc8

  • SHA1

    548f74986f9df7dc53d6de650e78e0fd996c2eb0

  • SHA256

    07aed3277266aade5214c9046842ffee884998032b739b2579cf38c96f03d07c

  • SHA512

    5de3875939352ce21717478f96d25b21b92d452988205b569e933eb6c2a2140c060d86f634daca026451a03eaaa7b8092ddbc6ae942f54617e797f60e1588b6b

  • SSDEEP

    12288:diMtg8wpRY+Y/Myx1f2zXbfkuIh2PMS65mPmg5WaUqlfOJLfIo6:y3Y3/pxgzLsu2BLQFrILIo6

Malware Config

Extracted

Family

redline

Botnet

dezik

C2

193.56.146.220:4174

Attributes
  • auth_value

    d39f21dca8edc10800b036ab83f4d75e

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      07aed3277266aade5214c9046842ffee884998032b739b2579cf38c96f03d07c

    • Size

      730KB

    • MD5

      e6fd0be5db872f1df456931294a21bc8

    • SHA1

      548f74986f9df7dc53d6de650e78e0fd996c2eb0

    • SHA256

      07aed3277266aade5214c9046842ffee884998032b739b2579cf38c96f03d07c

    • SHA512

      5de3875939352ce21717478f96d25b21b92d452988205b569e933eb6c2a2140c060d86f634daca026451a03eaaa7b8092ddbc6ae942f54617e797f60e1588b6b

    • SSDEEP

      12288:diMtg8wpRY+Y/Myx1f2zXbfkuIh2PMS65mPmg5WaUqlfOJLfIo6:y3Y3/pxgzLsu2BLQFrILIo6

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks