General

  • Target

    7778b61a58b4c40346a879aa8c13f91ce9d9205695016b38346937c8439195b8

  • Size

    1.1MB

  • Sample

    230321-mkap1shg64

  • MD5

    9cc8e7346fbc5add1fb7f1dac9819b8c

  • SHA1

    f8272bea2c6e3e5c7e951fc0aa30421395858b8f

  • SHA256

    7778b61a58b4c40346a879aa8c13f91ce9d9205695016b38346937c8439195b8

  • SHA512

    1c9634836a84607d22e1c47d0648603efc71a3bba4d8ae1bf72e5b059324389053319d7b0acd108f9d7931b01314093648da75853bd91e163cc11a74885e60c9

  • SSDEEP

    24576:Kdl7fQLmNEUNHC2HbD/skOl3h8nRB5vOeuUF3N6S1yxY5C8MC9Hc:KTQg1C27DoteRrmZdMCNC9

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      7778b61a58b4c40346a879aa8c13f91ce9d9205695016b38346937c8439195b8

    • Size

      1.1MB

    • MD5

      9cc8e7346fbc5add1fb7f1dac9819b8c

    • SHA1

      f8272bea2c6e3e5c7e951fc0aa30421395858b8f

    • SHA256

      7778b61a58b4c40346a879aa8c13f91ce9d9205695016b38346937c8439195b8

    • SHA512

      1c9634836a84607d22e1c47d0648603efc71a3bba4d8ae1bf72e5b059324389053319d7b0acd108f9d7931b01314093648da75853bd91e163cc11a74885e60c9

    • SSDEEP

      24576:Kdl7fQLmNEUNHC2HbD/skOl3h8nRB5vOeuUF3N6S1yxY5C8MC9Hc:KTQg1C27DoteRrmZdMCNC9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks