General

  • Target

    097910f22d181a314ce6efb3f7ed98127836ff3c089cb110c8be6fc07bf65c49

  • Size

    1011KB

  • Sample

    230324-jk8p9sfa9y

  • MD5

    a691b2a2fd9b1853a80e03a409a35b23

  • SHA1

    12531a735659f456f16508e04860fefd34813878

  • SHA256

    097910f22d181a314ce6efb3f7ed98127836ff3c089cb110c8be6fc07bf65c49

  • SHA512

    ffddf9180553931b965f683308f7de0bb1be11c921c2fbebcd9dc2e9c9817182ec64555c2ab25a117c148b18824cafa0a5f5c0a98ca8c87fb7ff5eec21780c56

  • SSDEEP

    24576:Oyn6Xux8WoQrhO2JhrDUjrPJiN45yJSRcJAfgiPQ:dn6e8gR4rSjq3P

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

roxi

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d8be78c896acc3cf8b8a6637a221376

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      097910f22d181a314ce6efb3f7ed98127836ff3c089cb110c8be6fc07bf65c49

    • Size

      1011KB

    • MD5

      a691b2a2fd9b1853a80e03a409a35b23

    • SHA1

      12531a735659f456f16508e04860fefd34813878

    • SHA256

      097910f22d181a314ce6efb3f7ed98127836ff3c089cb110c8be6fc07bf65c49

    • SHA512

      ffddf9180553931b965f683308f7de0bb1be11c921c2fbebcd9dc2e9c9817182ec64555c2ab25a117c148b18824cafa0a5f5c0a98ca8c87fb7ff5eec21780c56

    • SSDEEP

      24576:Oyn6Xux8WoQrhO2JhrDUjrPJiN45yJSRcJAfgiPQ:dn6e8gR4rSjq3P

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks