General

  • Target

    a8608741fd99b45add4564bf5b144bde2a43d12858b31f2f2e849feb51776ce4

  • Size

    1022KB

  • Sample

    230323-kz3m8sgf21

  • MD5

    e10edcbfee4e22e5ba919f1a2900b636

  • SHA1

    db4153268457958a7e486f7097576c09c6348d41

  • SHA256

    a8608741fd99b45add4564bf5b144bde2a43d12858b31f2f2e849feb51776ce4

  • SHA512

    7c6efe2649b673a4eb326084489d45c42e09b0ba4a109cef5b9e5596440d73eb4f0317f6ed4e0f99df649d26ea036ae09f0bf7d4b6a19000186962a15cbe1049

  • SSDEEP

    24576:yy92E97esi7IB0mgUs5/rgDWXuwMazU2n+Lf6p/:Z98soIHOJrqUuFaQ2yf6

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      a8608741fd99b45add4564bf5b144bde2a43d12858b31f2f2e849feb51776ce4

    • Size

      1022KB

    • MD5

      e10edcbfee4e22e5ba919f1a2900b636

    • SHA1

      db4153268457958a7e486f7097576c09c6348d41

    • SHA256

      a8608741fd99b45add4564bf5b144bde2a43d12858b31f2f2e849feb51776ce4

    • SHA512

      7c6efe2649b673a4eb326084489d45c42e09b0ba4a109cef5b9e5596440d73eb4f0317f6ed4e0f99df649d26ea036ae09f0bf7d4b6a19000186962a15cbe1049

    • SSDEEP

      24576:yy92E97esi7IB0mgUs5/rgDWXuwMazU2n+Lf6p/:Z98soIHOJrqUuFaQ2yf6

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks