General

  • Target

    ab161770108f8001c53afd0960b2862b7377a921ed5043b867f94505dca5c0b5

  • Size

    1.3MB

  • Sample

    230315-zmkdfsfc46

  • MD5

    4f86ef42d159cc55051de1b4995fce71

  • SHA1

    1a7d6e5748f0e86eea107ce35596fb15dc66f643

  • SHA256

    ab161770108f8001c53afd0960b2862b7377a921ed5043b867f94505dca5c0b5

  • SHA512

    37b948786dee24183fd863a1d7fd48001805cf1740585a7b4877eed68326a0a638d915f67ed0b330bee7afbead2fe020be8051f82d343ca50dbdf2694f12b7ff

  • SSDEEP

    24576:ZdVHC7LCCAXcO4R6k507UMXTbS8+l9J4dAsB+X643:v03YkR6ku7UMXXS4dAsB+X

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      ab161770108f8001c53afd0960b2862b7377a921ed5043b867f94505dca5c0b5

    • Size

      1.3MB

    • MD5

      4f86ef42d159cc55051de1b4995fce71

    • SHA1

      1a7d6e5748f0e86eea107ce35596fb15dc66f643

    • SHA256

      ab161770108f8001c53afd0960b2862b7377a921ed5043b867f94505dca5c0b5

    • SHA512

      37b948786dee24183fd863a1d7fd48001805cf1740585a7b4877eed68326a0a638d915f67ed0b330bee7afbead2fe020be8051f82d343ca50dbdf2694f12b7ff

    • SSDEEP

      24576:ZdVHC7LCCAXcO4R6k507UMXTbS8+l9J4dAsB+X643:v03YkR6ku7UMXXS4dAsB+X

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks