General

  • Target

    d0ee0ae7aef97404ed1f1376eb33b4e11c5499a791f3069b0f2ed8c1d54fc943

  • Size

    689KB

  • Sample

    230317-m3qh7ahh31

  • MD5

    0eab3a937c97a04eba8694104bfe0320

  • SHA1

    a41c9d98108116191bf5d4c662aa94b785d3c78c

  • SHA256

    d0ee0ae7aef97404ed1f1376eb33b4e11c5499a791f3069b0f2ed8c1d54fc943

  • SHA512

    1bc56ff883e3e261fd58f9e0b508e3def119c7342c66ea1275d43cdfd51cd6a79eaadbe0fe73c166b2f0146a4ead9f51a066e41025da1b4563100703c0744b3f

  • SSDEEP

    12288:lMryy90QqMj4UhE9cElW48t9hUyWMYo2qIIiGfcmZzoMc:rylBhECE8t8yWX/IiyT7c

Malware Config

Extracted

Family

redline

Botnet

lint

C2

193.233.20.28:4125

Attributes
  • auth_value

    0e95262fb78243c67430f3148303e5b7

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Targets

    • Target

      d0ee0ae7aef97404ed1f1376eb33b4e11c5499a791f3069b0f2ed8c1d54fc943

    • Size

      689KB

    • MD5

      0eab3a937c97a04eba8694104bfe0320

    • SHA1

      a41c9d98108116191bf5d4c662aa94b785d3c78c

    • SHA256

      d0ee0ae7aef97404ed1f1376eb33b4e11c5499a791f3069b0f2ed8c1d54fc943

    • SHA512

      1bc56ff883e3e261fd58f9e0b508e3def119c7342c66ea1275d43cdfd51cd6a79eaadbe0fe73c166b2f0146a4ead9f51a066e41025da1b4563100703c0744b3f

    • SSDEEP

      12288:lMryy90QqMj4UhE9cElW48t9hUyWMYo2qIIiGfcmZzoMc:rylBhECE8t8yWX/IiyT7c

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks