General

  • Target

    86918a277d0440329c1ae0f7876ef008e71475b4b7e6f7fee27bc9743ab9b5ed

  • Size

    1003KB

  • Sample

    230323-sqdxhsad7y

  • MD5

    a4f8134861941fa76a94a01470a99452

  • SHA1

    af1dd94b7ca8a8b0711963f06b2db00b62cb78e2

  • SHA256

    86918a277d0440329c1ae0f7876ef008e71475b4b7e6f7fee27bc9743ab9b5ed

  • SHA512

    a1a828da8e8125efc562197aa486432858504a7cf305c91d60a84dc71588cace3dce58d4fd3c12c3ff8a9e39d10d0880f1096a5bad6f24c7066c5a4f756caa02

  • SSDEEP

    24576:HylRkA7mj2VBqjpngej+tTQi0hNVJPNrulRDYjfJ6x2:SlRF7zkW0YUi0hNrFrulRqR

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

trap

C2

193.233.20.30:4125

Attributes
  • auth_value

    b39a737e2e9eba88e48ab88d1061be9c

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      86918a277d0440329c1ae0f7876ef008e71475b4b7e6f7fee27bc9743ab9b5ed

    • Size

      1003KB

    • MD5

      a4f8134861941fa76a94a01470a99452

    • SHA1

      af1dd94b7ca8a8b0711963f06b2db00b62cb78e2

    • SHA256

      86918a277d0440329c1ae0f7876ef008e71475b4b7e6f7fee27bc9743ab9b5ed

    • SHA512

      a1a828da8e8125efc562197aa486432858504a7cf305c91d60a84dc71588cace3dce58d4fd3c12c3ff8a9e39d10d0880f1096a5bad6f24c7066c5a4f756caa02

    • SSDEEP

      24576:HylRkA7mj2VBqjpngej+tTQi0hNVJPNrulRDYjfJ6x2:SlRF7zkW0YUi0hNrFrulRqR

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks