General

  • Target

    97454c44c2a733ae67cc3d4158c64138b0a21894e104ad8b31d599eab5f0ed99

  • Size

    1.2MB

  • Sample

    230318-m685pseb3s

  • MD5

    d4d12ca25e8be3613e03f31dd86a6cff

  • SHA1

    2556ca4db413b4a5a35cf296b31c467c943e8523

  • SHA256

    97454c44c2a733ae67cc3d4158c64138b0a21894e104ad8b31d599eab5f0ed99

  • SHA512

    fc51ad1bfa0d63ea3518f2ce187fabf2cdd1d4938e959a42e7c7d9ab7ea4c04ae73a64cbc365d858206914cd34c83c73278f4f32c37b2dd3aea01398d7df5427

  • SSDEEP

    24576:7LqRgL+yBbTGv9bti2okQsRVs+CkD8r49sIH:72RoOF42okQswM

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      97454c44c2a733ae67cc3d4158c64138b0a21894e104ad8b31d599eab5f0ed99

    • Size

      1.2MB

    • MD5

      d4d12ca25e8be3613e03f31dd86a6cff

    • SHA1

      2556ca4db413b4a5a35cf296b31c467c943e8523

    • SHA256

      97454c44c2a733ae67cc3d4158c64138b0a21894e104ad8b31d599eab5f0ed99

    • SHA512

      fc51ad1bfa0d63ea3518f2ce187fabf2cdd1d4938e959a42e7c7d9ab7ea4c04ae73a64cbc365d858206914cd34c83c73278f4f32c37b2dd3aea01398d7df5427

    • SSDEEP

      24576:7LqRgL+yBbTGv9bti2okQsRVs+CkD8r49sIH:72RoOF42okQswM

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks