General

  • Target

    cf5142e98574572920f35501ef34ce7d7f88d497164b115fcbc7e2c64759fe59

  • Size

    1.0MB

  • Sample

    230313-f19eysag4w

  • MD5

    69e107ee655f1ec2e0d0ed41e8e4fd46

  • SHA1

    dfe8e45cfafe574306696185c83c6f49785fb46c

  • SHA256

    cf5142e98574572920f35501ef34ce7d7f88d497164b115fcbc7e2c64759fe59

  • SHA512

    e733937d6e65ca55b660f60d179f4bf95e5b1687b0d845e1a1d252d9723f3771b24866f83d26aa631bf743e75e34d15e78469868efe0ce531f5ccd33345c173b

  • SSDEEP

    24576:+EeFfgRTVSH7Ho9NoMQ4BZ2y84P7xyE439i3g085vT4zvk:+9FfwM7+VBY4TcHs3g54b

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

vina

C2

193.233.20.28:4125

Attributes
  • auth_value

    7e90e85c9cea0965a2bfd23e1cfc6bc8

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      cf5142e98574572920f35501ef34ce7d7f88d497164b115fcbc7e2c64759fe59

    • Size

      1.0MB

    • MD5

      69e107ee655f1ec2e0d0ed41e8e4fd46

    • SHA1

      dfe8e45cfafe574306696185c83c6f49785fb46c

    • SHA256

      cf5142e98574572920f35501ef34ce7d7f88d497164b115fcbc7e2c64759fe59

    • SHA512

      e733937d6e65ca55b660f60d179f4bf95e5b1687b0d845e1a1d252d9723f3771b24866f83d26aa631bf743e75e34d15e78469868efe0ce531f5ccd33345c173b

    • SSDEEP

      24576:+EeFfgRTVSH7Ho9NoMQ4BZ2y84P7xyE439i3g085vT4zvk:+9FfwM7+VBY4TcHs3g54b

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks