General

  • Target

    8257367cbc16f12da730ae45a12c45554bf9a12f16cf27c3f54f3d8ab871a3fb.zip

  • Size

    598KB

  • Sample

    230310-nf5j9sdb99

  • MD5

    10a0ea4d84d196980d4c5183175766d1

  • SHA1

    360f2092c67c53eb12f315d556d2eab01c402a7e

  • SHA256

    dba43aa69831aabbefc729404532336c3dd23a617b04efa6462d7da674c7a106

  • SHA512

    02c6e634d16c8195c67f072a3d1fe974f0cb44bc30fe08d6aeb3be9fa4c74ba7b53c79353474f03687cebd7aa865238848ce0afe0457783bb8b1372407d94142

  • SSDEEP

    12288:EFOIIM8azRQaovsQqS/sXtRfLIO2a8ii28NrqLMvTr5e2/xJZzhfh2U6:QOId8KRQ3vpqDvQ28NroY/xXzhfhG

Malware Config

Extracted

Family

redline

Botnet

dezik

C2

193.56.146.220:4174

Attributes
  • auth_value

    d39f21dca8edc10800b036ab83f4d75e

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      8257367cbc16f12da730ae45a12c45554bf9a12f16cf27c3f54f3d8ab871a3fb.exe

    • Size

      716KB

    • MD5

      6a6a0cc212d82b7e19c05c3c41a68914

    • SHA1

      41cda4803b66e5db89eebc6651fe4ae2b0f21f4b

    • SHA256

      8257367cbc16f12da730ae45a12c45554bf9a12f16cf27c3f54f3d8ab871a3fb

    • SHA512

      5876f235894eeafae9376bebfa31f188cf1ba8c7d258ff9d64e700be6c865005635241d23bba7e9a6f81434d3698f513ca8e4cd9c1c95e182da48528e6f734eb

    • SSDEEP

      12288:XkQH4MLTHJ9dj9pi/3TtReM4AreTcrrVGU5k7yDpLD5kNS2U/:T4MnHJ9JK3TtReMa8r0U5iyfkNW

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks