General

  • Target

    ed434e4d394a4447d209b97cccd98eaed9e7a3468ad9f945eac7768e67ef67a3

  • Size

    656KB

  • Sample

    230317-b346ssdg23

  • MD5

    85559b6e8036a4813bbebdd9b9959153

  • SHA1

    5ddb986eb22f589b935dead91cb6383a3732b235

  • SHA256

    ed434e4d394a4447d209b97cccd98eaed9e7a3468ad9f945eac7768e67ef67a3

  • SHA512

    e43e18a2f3e6303a2e48fecc5121da7fd6848a2a6a7ee3e62045f7ca69a91dde77b1ec377b0e739157363a06dd399f36708b9b5fde9594143ad957a05e5dc323

  • SSDEEP

    12288:3Mrly90T+kBwbWBIeOoOiUGLMRRM7/ebd3LmymGww8Q6:qyUBwbWBlOoFORVLSBwZ6

Malware Config

Extracted

Family

redline

Botnet

lint

C2

193.233.20.28:4125

Attributes
  • auth_value

    0e95262fb78243c67430f3148303e5b7

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Targets

    • Target

      ed434e4d394a4447d209b97cccd98eaed9e7a3468ad9f945eac7768e67ef67a3

    • Size

      656KB

    • MD5

      85559b6e8036a4813bbebdd9b9959153

    • SHA1

      5ddb986eb22f589b935dead91cb6383a3732b235

    • SHA256

      ed434e4d394a4447d209b97cccd98eaed9e7a3468ad9f945eac7768e67ef67a3

    • SHA512

      e43e18a2f3e6303a2e48fecc5121da7fd6848a2a6a7ee3e62045f7ca69a91dde77b1ec377b0e739157363a06dd399f36708b9b5fde9594143ad957a05e5dc323

    • SSDEEP

      12288:3Mrly90T+kBwbWBIeOoOiUGLMRRM7/ebd3LmymGww8Q6:qyUBwbWBlOoFORVLSBwZ6

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks