General

  • Target

    00a14cd4fc8b12979c52c658d7eb3e1c7779f834f7f6cb2defa6676e9faba329

  • Size

    1.2MB

  • Sample

    230316-bfle6sgc22

  • MD5

    05e7cd404c787a4b69c6eb8d1ad38d1a

  • SHA1

    29700160116b748e631f00318309372c3d503df7

  • SHA256

    00a14cd4fc8b12979c52c658d7eb3e1c7779f834f7f6cb2defa6676e9faba329

  • SHA512

    51dadd7064cd2f28be6e668af83f8987db3fc5ea6ff3e474cd35e7bf8ff692fe344e44a4d6de9a34564693071a0f1a0df3b5f6d5823418584075f8cb80c5320b

  • SSDEEP

    24576:pjO6TaUBKNRVlUMHEh0g88bDmHtMRlTw7I7A99xoimjDVOdfTPxerTay:B7HKNRVl5kh/8OmH23Es89roTX8frxUn

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      00a14cd4fc8b12979c52c658d7eb3e1c7779f834f7f6cb2defa6676e9faba329

    • Size

      1.2MB

    • MD5

      05e7cd404c787a4b69c6eb8d1ad38d1a

    • SHA1

      29700160116b748e631f00318309372c3d503df7

    • SHA256

      00a14cd4fc8b12979c52c658d7eb3e1c7779f834f7f6cb2defa6676e9faba329

    • SHA512

      51dadd7064cd2f28be6e668af83f8987db3fc5ea6ff3e474cd35e7bf8ff692fe344e44a4d6de9a34564693071a0f1a0df3b5f6d5823418584075f8cb80c5320b

    • SSDEEP

      24576:pjO6TaUBKNRVlUMHEh0g88bDmHtMRlTw7I7A99xoimjDVOdfTPxerTay:B7HKNRVl5kh/8OmH23Es89roTX8frxUn

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks