General

  • Target

    0eeb8126d68a5df250e2083d8909a43be6651f5a4450fa46b191477cd0bd4a8c

  • Size

    450KB

  • Sample

    230312-pej3lsdg64

  • MD5

    bcad11f6ab8d5a389e9ca1a189ab6840

  • SHA1

    3be4bcbff8fcc6e5631434807bbb3eeb9ffa9814

  • SHA256

    0eeb8126d68a5df250e2083d8909a43be6651f5a4450fa46b191477cd0bd4a8c

  • SHA512

    9cc12b9343a4744d1cd3a712e20cdcf9c8bb9d116a989d0962b2ca209370b56a9a880ad9513763f1d5298c15fd25b15eec6b987d0755483eea818091c15652f6

  • SSDEEP

    6144:FpqCfjcHwMbLU3dw4QHVa8GcVCZMh9jbMxCC7Nx9ipAEzmq4JerYh0K:FkAkBbQ3EHkpZ+9jbMMC7diiEZ4ArGP

Malware Config

Extracted

Family

redline

Botnet

well

C2

193.233.20.28:4125

Attributes
  • auth_value

    265e7373dd436339d88347c08a10b402

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      0eeb8126d68a5df250e2083d8909a43be6651f5a4450fa46b191477cd0bd4a8c

    • Size

      450KB

    • MD5

      bcad11f6ab8d5a389e9ca1a189ab6840

    • SHA1

      3be4bcbff8fcc6e5631434807bbb3eeb9ffa9814

    • SHA256

      0eeb8126d68a5df250e2083d8909a43be6651f5a4450fa46b191477cd0bd4a8c

    • SHA512

      9cc12b9343a4744d1cd3a712e20cdcf9c8bb9d116a989d0962b2ca209370b56a9a880ad9513763f1d5298c15fd25b15eec6b987d0755483eea818091c15652f6

    • SSDEEP

      6144:FpqCfjcHwMbLU3dw4QHVa8GcVCZMh9jbMxCC7Nx9ipAEzmq4JerYh0K:FkAkBbQ3EHkpZ+9jbMMC7diiEZ4ArGP

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks