General

  • Target

    4fc48983faf41a7d87072fbdd3c7f24030e4a0cd4f006fa6b153fec831a52e0e

  • Size

    1.1MB

  • Sample

    230313-h4pwtsha84

  • MD5

    2595564be72da8d57f4167d766cbc300

  • SHA1

    19773df9aa777aeedaae5216cef138a87e427ca6

  • SHA256

    4fc48983faf41a7d87072fbdd3c7f24030e4a0cd4f006fa6b153fec831a52e0e

  • SHA512

    7a1f7cf811081d84777989710d82f9c0074b0f3f23d468664339632d9165cbd1b04a0ffcdfbd6d02ccf456a5343e3e4946dbf12951f6ed624b444ce85f7e2185

  • SSDEEP

    24576:IIpYjWsLGJzJF0DuVXBs5xo9qTwg/mwiEptybz7rWwNXVdq:pYqhJzJKyVXBs7Tz/b2bz7rWAX

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

vina

C2

193.233.20.28:4125

Attributes
  • auth_value

    7e90e85c9cea0965a2bfd23e1cfc6bc8

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      4fc48983faf41a7d87072fbdd3c7f24030e4a0cd4f006fa6b153fec831a52e0e

    • Size

      1.1MB

    • MD5

      2595564be72da8d57f4167d766cbc300

    • SHA1

      19773df9aa777aeedaae5216cef138a87e427ca6

    • SHA256

      4fc48983faf41a7d87072fbdd3c7f24030e4a0cd4f006fa6b153fec831a52e0e

    • SHA512

      7a1f7cf811081d84777989710d82f9c0074b0f3f23d468664339632d9165cbd1b04a0ffcdfbd6d02ccf456a5343e3e4946dbf12951f6ed624b444ce85f7e2185

    • SSDEEP

      24576:IIpYjWsLGJzJF0DuVXBs5xo9qTwg/mwiEptybz7rWwNXVdq:pYqhJzJKyVXBs7Tz/b2bz7rWAX

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks