General

  • Target

    e570396eccb821b4660c48beddda189e.bin

  • Size

    989KB

  • Sample

    230320-b5sksadc81

  • MD5

    9102b41d43b848d1898feac72c74b784

  • SHA1

    9381d463b4e75d31321aa06b07287b2c7efb888d

  • SHA256

    c9ab7e42537a6056ff9642a84239551bb6dca4f39719952ec2d873d912977a63

  • SHA512

    923f7e33141a9fcb477c64f1ef24116fd481b8619bac7671cbd5a534509680b4d7741e2d2d3860f0faba494ae83c18fa800acf4619a5ebd69c018708e14a83e1

  • SSDEEP

    24576:bBIIW0a/Nh+RszrXwdmYUw1ZFmFSg0uSYj0xE9fWncdUQ05gdZPy:lGaicd9U88F6xYj0xE9f+5Q0WdY

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

vint

C2

193.233.20.30:4125

Attributes
  • auth_value

    fb8811912f8370b3d23bffda092d88d0

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Extracted

Family

redline

Botnet

build_main

C2

80.85.156.168:20189

Attributes
  • auth_value

    5e5c9cacc6d168f8ade7fb6419edb114

Extracted

Family

redline

Botnet

Rocket

C2

95.217.188.21:7283

Attributes
  • auth_value

    0095203c91b01efccf3842dc176e53f2

Targets

    • Target

      daeac2b1c89403f439acd1737dac2e3023ea37716ece0a3a7d4125520d773857.exe

    • Size

      1.0MB

    • MD5

      e570396eccb821b4660c48beddda189e

    • SHA1

      8dc57d96e954a7e7cb8487832e6b40dd9525b284

    • SHA256

      daeac2b1c89403f439acd1737dac2e3023ea37716ece0a3a7d4125520d773857

    • SHA512

      f2d1984058a8227f43797ccd9a863ea943d200a41394f086b4e56ca708c3e8bdc59292c41f426640a18239228c0c57c3b93070d8aa0e52f7dbd7e2387dc38831

    • SSDEEP

      24576:Dyi6JIQ6tbJ2ml4K4zRH7pYiVzK4XNTWfKC9ZI+pNecHyC:Wi6JH40rH1SezK5Fa

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

2
T1089

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks