General

  • Target

    0e6fe12c6457dd61c38bb1c928ea2fd4a2d8c17e7538ca46c469346c20e13282

  • Size

    1010KB

  • Sample

    230324-kpkpnsfd3y

  • MD5

    4c73378af4ce8cbeb6b707997ff55e62

  • SHA1

    0b6ac3e3a3b97a4278bfc8a44c4847b152bacc7c

  • SHA256

    0e6fe12c6457dd61c38bb1c928ea2fd4a2d8c17e7538ca46c469346c20e13282

  • SHA512

    d31fab9b44f6826d37ec0c159c94308eaf4ab00dd1ca8e950be7e5fd800797a84630e91a77555a34654e3fafc7d536f12a8209aa42a67dd9710827bd3a846f03

  • SSDEEP

    24576:Uy4SQzjF8tJdq8vZmXVISEompb5EFNyxXrUCrQVM5:jIvF8tvvgXVI+Y6F8xXrfQV

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

roxi

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d8be78c896acc3cf8b8a6637a221376

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      0e6fe12c6457dd61c38bb1c928ea2fd4a2d8c17e7538ca46c469346c20e13282

    • Size

      1010KB

    • MD5

      4c73378af4ce8cbeb6b707997ff55e62

    • SHA1

      0b6ac3e3a3b97a4278bfc8a44c4847b152bacc7c

    • SHA256

      0e6fe12c6457dd61c38bb1c928ea2fd4a2d8c17e7538ca46c469346c20e13282

    • SHA512

      d31fab9b44f6826d37ec0c159c94308eaf4ab00dd1ca8e950be7e5fd800797a84630e91a77555a34654e3fafc7d536f12a8209aa42a67dd9710827bd3a846f03

    • SSDEEP

      24576:Uy4SQzjF8tJdq8vZmXVISEompb5EFNyxXrUCrQVM5:jIvF8tvvgXVI+Y6F8xXrfQV

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks