General

  • Target

    7886241b408ae48e30b4e8e95caaad8274859a831120d5885e0ff8bb5669f105

  • Size

    689KB

  • Sample

    230318-k77l6adg9z

  • MD5

    a7542ebf63e8d05480b2a23adf6afe6e

  • SHA1

    1de53cfb6ced0402b23b99dcb22c629dd792aa66

  • SHA256

    7886241b408ae48e30b4e8e95caaad8274859a831120d5885e0ff8bb5669f105

  • SHA512

    21354d7fcde9e36339068e417ba8033a2aeb79fa8a9cc02110f58bf2dd16d975094df79f49e08f86cfda6015ffe37eba893e04705c7b03426dc558ca8df3c4ae

  • SSDEEP

    12288:qMrpy90UhvKNlTMktgJm6dL+0izySZkStSGw5xI9eopoj0:nyBvclYktbp0+ySXtJw2eopk0

Malware Config

Extracted

Family

redline

Botnet

lint

C2

193.233.20.28:4125

Attributes
  • auth_value

    0e95262fb78243c67430f3148303e5b7

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Targets

    • Target

      7886241b408ae48e30b4e8e95caaad8274859a831120d5885e0ff8bb5669f105

    • Size

      689KB

    • MD5

      a7542ebf63e8d05480b2a23adf6afe6e

    • SHA1

      1de53cfb6ced0402b23b99dcb22c629dd792aa66

    • SHA256

      7886241b408ae48e30b4e8e95caaad8274859a831120d5885e0ff8bb5669f105

    • SHA512

      21354d7fcde9e36339068e417ba8033a2aeb79fa8a9cc02110f58bf2dd16d975094df79f49e08f86cfda6015ffe37eba893e04705c7b03426dc558ca8df3c4ae

    • SSDEEP

      12288:qMrpy90UhvKNlTMktgJm6dL+0izySZkStSGw5xI9eopoj0:nyBvclYktbp0+ySXtJw2eopk0

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks