General

  • Target

    a9ca0397e69910b746830d6e667278e4906bc75f0cfccededfddce0d3146cb01

  • Size

    1.0MB

  • Sample

    230324-d43qgaea4z

  • MD5

    807ab220732538d58a3dec91ee4ad36d

  • SHA1

    cad2cc077185e1f70c956cf69a1727f189e255e5

  • SHA256

    a9ca0397e69910b746830d6e667278e4906bc75f0cfccededfddce0d3146cb01

  • SHA512

    bb105d224dfba11a5c9e2ea2ae041f4b1be72e3377ac5d85dfe180817f1bc292c07fa1f49da81bc61244abe5297c00b063f0506bbee48ec86249e37d3053108d

  • SSDEEP

    24576:gyZVgdQ3JwSB7fph13A3GY5piokL90C+w:nZVKQ3NX13A/5pd095+

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

bolt

C2

193.233.20.31:4125

Attributes
  • auth_value

    29540c7bf0277243e2faf6601e15a754

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Targets

    • Target

      a9ca0397e69910b746830d6e667278e4906bc75f0cfccededfddce0d3146cb01

    • Size

      1.0MB

    • MD5

      807ab220732538d58a3dec91ee4ad36d

    • SHA1

      cad2cc077185e1f70c956cf69a1727f189e255e5

    • SHA256

      a9ca0397e69910b746830d6e667278e4906bc75f0cfccededfddce0d3146cb01

    • SHA512

      bb105d224dfba11a5c9e2ea2ae041f4b1be72e3377ac5d85dfe180817f1bc292c07fa1f49da81bc61244abe5297c00b063f0506bbee48ec86249e37d3053108d

    • SSDEEP

      24576:gyZVgdQ3JwSB7fph13A3GY5piokL90C+w:nZVKQ3NX13A/5pd095+

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks