General

  • Target

    6c376e04ac060a48409f6f43b38739f03f76068a86b00603e0c8a47be8dcb8e6

  • Size

    1.3MB

  • Sample

    230321-x3b1xaef6v

  • MD5

    11bfbc6e8835a495d3d5252f44f6fe54

  • SHA1

    c09c69d7b8d358431e09b9dfcd7bad26efcaab97

  • SHA256

    6c376e04ac060a48409f6f43b38739f03f76068a86b00603e0c8a47be8dcb8e6

  • SHA512

    f60f180d89837cd5017cb9ba0c5f7958dd16a68856d45014b734cd923c1fd83f7005fa9cc6049c3e39dc18227a6a2eb12442e3afa648542d010a7938ae04880a

  • SSDEEP

    24576:MF7kbWMH5bL+ZmZhqNrZ8fngYq8u2iXhKsfMe+MVL538dWW:MCKE5H+ZmXqNCna8z4DlVL5O

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

maxi

C2

193.233.20.30:4125

Attributes
  • auth_value

    6e90da232d4c2e35c1a36c250f5f8904

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      6c376e04ac060a48409f6f43b38739f03f76068a86b00603e0c8a47be8dcb8e6

    • Size

      1.3MB

    • MD5

      11bfbc6e8835a495d3d5252f44f6fe54

    • SHA1

      c09c69d7b8d358431e09b9dfcd7bad26efcaab97

    • SHA256

      6c376e04ac060a48409f6f43b38739f03f76068a86b00603e0c8a47be8dcb8e6

    • SHA512

      f60f180d89837cd5017cb9ba0c5f7958dd16a68856d45014b734cd923c1fd83f7005fa9cc6049c3e39dc18227a6a2eb12442e3afa648542d010a7938ae04880a

    • SSDEEP

      24576:MF7kbWMH5bL+ZmZhqNrZ8fngYq8u2iXhKsfMe+MVL538dWW:MCKE5H+ZmXqNCna8z4DlVL5O

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks