General

  • Target

    4ed36a105052b8e5651e851f9415f9778605ccadde32bef9f3dcbdfe23dbe1b7

  • Size

    1.0MB

  • Sample

    230313-ejwl4aae4s

  • MD5

    de81d65a98f97b5231dca07cf362d6c4

  • SHA1

    47095e193c71231fef3ce8f4008bb4e63ebf1b37

  • SHA256

    4ed36a105052b8e5651e851f9415f9778605ccadde32bef9f3dcbdfe23dbe1b7

  • SHA512

    151b0ae4f17240dc0ef7a11d9a34c457927374ccf0de8937a1d278697f466464ee24a0e9476c55d07a3461b761a099aa4b35af6bebe5abbc98caa31da0be69c9

  • SSDEEP

    24576:lMbRJYQ7llq8IjPVOQpe1775ysdJw9ToAmMAo0Qvk:loYQ7SjPECK/5yQJwMMAo0y

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

vina

C2

193.233.20.28:4125

Attributes
  • auth_value

    7e90e85c9cea0965a2bfd23e1cfc6bc8

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      4ed36a105052b8e5651e851f9415f9778605ccadde32bef9f3dcbdfe23dbe1b7

    • Size

      1.0MB

    • MD5

      de81d65a98f97b5231dca07cf362d6c4

    • SHA1

      47095e193c71231fef3ce8f4008bb4e63ebf1b37

    • SHA256

      4ed36a105052b8e5651e851f9415f9778605ccadde32bef9f3dcbdfe23dbe1b7

    • SHA512

      151b0ae4f17240dc0ef7a11d9a34c457927374ccf0de8937a1d278697f466464ee24a0e9476c55d07a3461b761a099aa4b35af6bebe5abbc98caa31da0be69c9

    • SSDEEP

      24576:lMbRJYQ7llq8IjPVOQpe1775ysdJw9ToAmMAo0Qvk:loYQ7SjPECK/5yQJwMMAo0y

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks