General

  • Target

    a33ed19e93605ba39ab6e4715d89aa672665596cd2e6370d78e0fd3f93e5f763

  • Size

    1010KB

  • Sample

    230324-mchqnadf39

  • MD5

    fff78c3888dcd6b7038ba95f36288c89

  • SHA1

    9390104a600921f4de5821e788676f97adf31c2b

  • SHA256

    a33ed19e93605ba39ab6e4715d89aa672665596cd2e6370d78e0fd3f93e5f763

  • SHA512

    26dc0d01fa6c9f651e1159f43f46aa5bc8632bb2465647dace037c9709fafa1369377c97e3256cdf5b928a022b3be67c259c6c39b8815b3e75162cffa602ec47

  • SSDEEP

    24576:zyuO1MvD9PovkbNTF08eQq0/RbZb+suszUiTZmrcjlOfVt:GX1s9ocbNTy8eQ/BZfusyvfV

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

roxi

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d8be78c896acc3cf8b8a6637a221376

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      a33ed19e93605ba39ab6e4715d89aa672665596cd2e6370d78e0fd3f93e5f763

    • Size

      1010KB

    • MD5

      fff78c3888dcd6b7038ba95f36288c89

    • SHA1

      9390104a600921f4de5821e788676f97adf31c2b

    • SHA256

      a33ed19e93605ba39ab6e4715d89aa672665596cd2e6370d78e0fd3f93e5f763

    • SHA512

      26dc0d01fa6c9f651e1159f43f46aa5bc8632bb2465647dace037c9709fafa1369377c97e3256cdf5b928a022b3be67c259c6c39b8815b3e75162cffa602ec47

    • SSDEEP

      24576:zyuO1MvD9PovkbNTF08eQq0/RbZb+suszUiTZmrcjlOfVt:GX1s9ocbNTy8eQ/BZfusyvfV

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks