General

  • Target

    9dfba4ea7bca4acc262b9112c44c72da3310eedfe0b3f767dd7973c1c1399002

  • Size

    688KB

  • Sample

    230317-t3kfhabb6v

  • MD5

    0832811aa79af95cc730b30b52303594

  • SHA1

    12d571845971271614e4abb3986bc42dc6744faa

  • SHA256

    9dfba4ea7bca4acc262b9112c44c72da3310eedfe0b3f767dd7973c1c1399002

  • SHA512

    a83e62af713a059c83f823a871e6113de2710e94f707d1b2a2e07ff10ba96a272517198c6927b295be690b0c25d05c91913e99e0158484badbbec025f2199f4d

  • SSDEEP

    12288:oMrpy90661Spamqiatmnh19IOc/TLrbDu/oR4Z0MyZRvT+ON:ByZ61SpamqrQnj9IOcn4oR4NgRvTF

Malware Config

Extracted

Family

redline

Botnet

lint

C2

193.233.20.28:4125

Attributes
  • auth_value

    0e95262fb78243c67430f3148303e5b7

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e

Extracted

Family

redline

Botnet

rockins

C2

46.3.197.223:44446

Attributes
  • auth_value

    e36e02733016977bec980781774c6ef4

Targets

    • Target

      9dfba4ea7bca4acc262b9112c44c72da3310eedfe0b3f767dd7973c1c1399002

    • Size

      688KB

    • MD5

      0832811aa79af95cc730b30b52303594

    • SHA1

      12d571845971271614e4abb3986bc42dc6744faa

    • SHA256

      9dfba4ea7bca4acc262b9112c44c72da3310eedfe0b3f767dd7973c1c1399002

    • SHA512

      a83e62af713a059c83f823a871e6113de2710e94f707d1b2a2e07ff10ba96a272517198c6927b295be690b0c25d05c91913e99e0158484badbbec025f2199f4d

    • SSDEEP

      12288:oMrpy90661Spamqiatmnh19IOc/TLrbDu/oR4Z0MyZRvT+ON:ByZ61SpamqrQnj9IOcn4oR4NgRvTF

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks