General

  • Target

    1932de645d3180d75a11eb55d3ed700a4d4a21106366103fc1dc44f82e68a93d

  • Size

    1010KB

  • Sample

    230324-kt1axsfd51

  • MD5

    5f24cc7563b0fb71fb5930401a5be716

  • SHA1

    1cece4babbaf60b3db04206d2b767cedf3aa2b30

  • SHA256

    1932de645d3180d75a11eb55d3ed700a4d4a21106366103fc1dc44f82e68a93d

  • SHA512

    47a883bbca00da3979880fd835dde63c5aa27133ed1b16c4d1895a48812fe367c9726b0d337fa2e09ccd282bbe02a6b33c0e3e28e056b3c35344bef66e878734

  • SSDEEP

    24576:HyqXhomsI8W+XJREDHv8DUg37N+Zcb5RMzDGJURAhDi1mVb:S+hwZRELv8j37NIUfMnGUA9

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

roxi

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d8be78c896acc3cf8b8a6637a221376

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      1932de645d3180d75a11eb55d3ed700a4d4a21106366103fc1dc44f82e68a93d

    • Size

      1010KB

    • MD5

      5f24cc7563b0fb71fb5930401a5be716

    • SHA1

      1cece4babbaf60b3db04206d2b767cedf3aa2b30

    • SHA256

      1932de645d3180d75a11eb55d3ed700a4d4a21106366103fc1dc44f82e68a93d

    • SHA512

      47a883bbca00da3979880fd835dde63c5aa27133ed1b16c4d1895a48812fe367c9726b0d337fa2e09ccd282bbe02a6b33c0e3e28e056b3c35344bef66e878734

    • SSDEEP

      24576:HyqXhomsI8W+XJREDHv8DUg37N+Zcb5RMzDGJURAhDi1mVb:S+hwZRELv8j37NIUfMnGUA9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks