General

  • Target

    a9365003bfeb3062fe7303d18c0ebe296e272e8dafdf66409a567848636b57b2

  • Size

    1.2MB

  • Sample

    230314-fqspfsff4t

  • MD5

    c6286a52036fb1a6c14c45bd045fdebc

  • SHA1

    bfdc01ea4a91bc1256f06df1b956d3ff5412f113

  • SHA256

    a9365003bfeb3062fe7303d18c0ebe296e272e8dafdf66409a567848636b57b2

  • SHA512

    764246ac701ce654f420b420a19df0bab3160ac98b20c4cbadeb9b4f11b4e841b515feb4989222fbed57e6c57999871e6a3a5b963a2c4f26dc32774f1e090726

  • SSDEEP

    24576:sOoB3qV5Q7GHDGVwuqC4KPTJsMADPBm0owb4GX51:EqjQ7GHDZuqoTJs/Q0o7O

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

vina

C2

193.233.20.28:4125

Attributes
  • auth_value

    7e90e85c9cea0965a2bfd23e1cfc6bc8

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      a9365003bfeb3062fe7303d18c0ebe296e272e8dafdf66409a567848636b57b2

    • Size

      1.2MB

    • MD5

      c6286a52036fb1a6c14c45bd045fdebc

    • SHA1

      bfdc01ea4a91bc1256f06df1b956d3ff5412f113

    • SHA256

      a9365003bfeb3062fe7303d18c0ebe296e272e8dafdf66409a567848636b57b2

    • SHA512

      764246ac701ce654f420b420a19df0bab3160ac98b20c4cbadeb9b4f11b4e841b515feb4989222fbed57e6c57999871e6a3a5b963a2c4f26dc32774f1e090726

    • SSDEEP

      24576:sOoB3qV5Q7GHDGVwuqC4KPTJsMADPBm0owb4GX51:EqjQ7GHDZuqoTJs/Q0o7O

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks