Resubmissions

16-03-2023 10:00

230316-l1sp4ace61 10

16-03-2023 09:56

230316-lyq4gsac57 10

General

  • Target

    efe646e8aec5a0b2e637d653a21ffca9f3a67d0bcf57b398650f0e3d4c1583cd

  • Size

    1.0MB

  • Sample

    230316-lyq4gsac57

  • MD5

    94682f7cabf9e9a1f267c04543d5fbb1

  • SHA1

    4eb0afb6c506a06ba2131018a1f4cd46966e1420

  • SHA256

    efe646e8aec5a0b2e637d653a21ffca9f3a67d0bcf57b398650f0e3d4c1583cd

  • SHA512

    773e29fd9899b6ec02d29ea6a310719d864088a52dadc457e15dab9b8c7d97a3cdd9e243d7b458eaabd4b61669f31ce5aa6a02b59feb954fc430d60ac6e57c75

  • SSDEEP

    24576:W9xoo7J5oONRY9TttU+I76MXwINTXkvvRno6O6atz+h:0oo7JNRMM7GAgRVO6Yz+

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      efe646e8aec5a0b2e637d653a21ffca9f3a67d0bcf57b398650f0e3d4c1583cd

    • Size

      1.0MB

    • MD5

      94682f7cabf9e9a1f267c04543d5fbb1

    • SHA1

      4eb0afb6c506a06ba2131018a1f4cd46966e1420

    • SHA256

      efe646e8aec5a0b2e637d653a21ffca9f3a67d0bcf57b398650f0e3d4c1583cd

    • SHA512

      773e29fd9899b6ec02d29ea6a310719d864088a52dadc457e15dab9b8c7d97a3cdd9e243d7b458eaabd4b61669f31ce5aa6a02b59feb954fc430d60ac6e57c75

    • SSDEEP

      24576:W9xoo7J5oONRY9TttU+I76MXwINTXkvvRno6O6atz+h:0oo7JNRMM7GAgRVO6Yz+

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks