General

  • Target

    0cfa8668d6c09ed9719fcc019302d8eeae6f51e6fa4132cb25448811713cdd77

  • Size

    465KB

  • Sample

    230310-w7x89seh33

  • MD5

    dc7ea2ab9b5b218f9e24a4e21c70ab5c

  • SHA1

    be0bf093facc868facd949bdf271f23873bcd575

  • SHA256

    0cfa8668d6c09ed9719fcc019302d8eeae6f51e6fa4132cb25448811713cdd77

  • SHA512

    22268e14907949a426e16dfb781c60a3beacbe6a67a55c380a4061c1da78bbce91b122f5cc020fbfa20ab6f58f8bfaa7d5cdaf75931649cad7169a60fa514c8a

  • SSDEEP

    12288:m/ATeDTJPy2K448pQmLg4AvD5oaEgRkowW0uZVL:mvJPbK4fHa1UzoL

Malware Config

Extracted

Family

redline

Botnet

dezik

C2

193.56.146.220:4174

Attributes
  • auth_value

    d39f21dca8edc10800b036ab83f4d75e

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      0cfa8668d6c09ed9719fcc019302d8eeae6f51e6fa4132cb25448811713cdd77

    • Size

      465KB

    • MD5

      dc7ea2ab9b5b218f9e24a4e21c70ab5c

    • SHA1

      be0bf093facc868facd949bdf271f23873bcd575

    • SHA256

      0cfa8668d6c09ed9719fcc019302d8eeae6f51e6fa4132cb25448811713cdd77

    • SHA512

      22268e14907949a426e16dfb781c60a3beacbe6a67a55c380a4061c1da78bbce91b122f5cc020fbfa20ab6f58f8bfaa7d5cdaf75931649cad7169a60fa514c8a

    • SSDEEP

      12288:m/ATeDTJPy2K448pQmLg4AvD5oaEgRkowW0uZVL:mvJPbK4fHa1UzoL

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks