General

  • Target

    28af7f6222238f49b11df38b3c77780bed3dc0b07f8b0b91adb7b41f230df840

  • Size

    1012KB

  • Sample

    230324-kx7jeafd61

  • MD5

    93a717f99e5d1677dc552c9f185b4e74

  • SHA1

    13f7311092f7507cde4d9b1c5c5d92b425930e09

  • SHA256

    28af7f6222238f49b11df38b3c77780bed3dc0b07f8b0b91adb7b41f230df840

  • SHA512

    39f19b1c1e3d501bb3b3f42201fb74de6243284826fa8b17144e65e6416756f539d673498a8931f3b5208678c852b2870b8856240de1f6e6be180a63dc8b7555

  • SSDEEP

    24576:fyInehrFt+GHMRMNSMc7+ybe+1AM1T0cLbZv:qIehrFt+GHMRMNSMcaGp1AM1T0cJ

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

roxi

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d8be78c896acc3cf8b8a6637a221376

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      28af7f6222238f49b11df38b3c77780bed3dc0b07f8b0b91adb7b41f230df840

    • Size

      1012KB

    • MD5

      93a717f99e5d1677dc552c9f185b4e74

    • SHA1

      13f7311092f7507cde4d9b1c5c5d92b425930e09

    • SHA256

      28af7f6222238f49b11df38b3c77780bed3dc0b07f8b0b91adb7b41f230df840

    • SHA512

      39f19b1c1e3d501bb3b3f42201fb74de6243284826fa8b17144e65e6416756f539d673498a8931f3b5208678c852b2870b8856240de1f6e6be180a63dc8b7555

    • SSDEEP

      24576:fyInehrFt+GHMRMNSMc7+ybe+1AM1T0cLbZv:qIehrFt+GHMRMNSMcaGp1AM1T0cJ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks