General

  • Target

    3ea9636568fecf69d66fcc9f4b1160541c16b95cccfcd490fd17e373261ea4fa

  • Size

    1.2MB

  • Sample

    230317-znr5paca4s

  • MD5

    f050910cba074c12d95447e199c11e49

  • SHA1

    996c81d4b7523adc6f2ac7ce549d3e42240bcef8

  • SHA256

    3ea9636568fecf69d66fcc9f4b1160541c16b95cccfcd490fd17e373261ea4fa

  • SHA512

    ee97e9f739a668073f7a526231f0edb785fb8aae9bc6720ef8e7002221cfdb72a89e008e56fb8aebfd26cbbd962f583971ad7752daa4cafceb1544fe1e08dcf5

  • SSDEEP

    24576:lgcL02I4/sr0X8KvEjUS3/XxExcPXxp2eCEpH:lgcL02Ix2SPX2+PX8

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      3ea9636568fecf69d66fcc9f4b1160541c16b95cccfcd490fd17e373261ea4fa

    • Size

      1.2MB

    • MD5

      f050910cba074c12d95447e199c11e49

    • SHA1

      996c81d4b7523adc6f2ac7ce549d3e42240bcef8

    • SHA256

      3ea9636568fecf69d66fcc9f4b1160541c16b95cccfcd490fd17e373261ea4fa

    • SHA512

      ee97e9f739a668073f7a526231f0edb785fb8aae9bc6720ef8e7002221cfdb72a89e008e56fb8aebfd26cbbd962f583971ad7752daa4cafceb1544fe1e08dcf5

    • SSDEEP

      24576:lgcL02I4/sr0X8KvEjUS3/XxExcPXxp2eCEpH:lgcL02Ix2SPX2+PX8

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks