General

  • Target

    15a85e5d86ae8778d612e718166fecf833021433237280c488a20c4cf40b1294

  • Size

    1010KB

  • Sample

    230324-j51kdsdb24

  • MD5

    c18481e382f935a26b26f0e5cad75e8f

  • SHA1

    55ab21bf2336b750c930f589f27c3790a787f39e

  • SHA256

    15a85e5d86ae8778d612e718166fecf833021433237280c488a20c4cf40b1294

  • SHA512

    911e18ed0f0c05b88eb1dce9029e5be36d7a33a0cee8f4a5af7bf82f33922d49e378e1264ae9fecf77dd2fcc25c768bc447cada233b8abea46dfb930ea94cc7b

  • SSDEEP

    12288:dMrDy90lK1jMSUdK9yr/ryot3YPg6xKiwfgbF+r6pXEbkLxmI4+N0L85PuK3Fd9a:uyP1jUyot3i1KiEILpXEbkV/LLttur

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

roxi

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d8be78c896acc3cf8b8a6637a221376

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      15a85e5d86ae8778d612e718166fecf833021433237280c488a20c4cf40b1294

    • Size

      1010KB

    • MD5

      c18481e382f935a26b26f0e5cad75e8f

    • SHA1

      55ab21bf2336b750c930f589f27c3790a787f39e

    • SHA256

      15a85e5d86ae8778d612e718166fecf833021433237280c488a20c4cf40b1294

    • SHA512

      911e18ed0f0c05b88eb1dce9029e5be36d7a33a0cee8f4a5af7bf82f33922d49e378e1264ae9fecf77dd2fcc25c768bc447cada233b8abea46dfb930ea94cc7b

    • SSDEEP

      12288:dMrDy90lK1jMSUdK9yr/ryot3YPg6xKiwfgbF+r6pXEbkLxmI4+N0L85PuK3Fd9a:uyP1jUyot3i1KiEILpXEbkV/LLttur

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks