General

  • Target

    61eab3811c02885bafa1aade7d09b51b4bab54b9404e6de4670f2b90302553c9

  • Size

    1.0MB

  • Sample

    230325-hjkflsdg2x

  • MD5

    24822fe3d0265ac13552cde42cc5e74c

  • SHA1

    46c7aade18db5e9eac91625c93518ec7a311e312

  • SHA256

    61eab3811c02885bafa1aade7d09b51b4bab54b9404e6de4670f2b90302553c9

  • SHA512

    0ab26d6488e82cc494680d889d3c891ddc2fd0dcc8b34d5f2062bcf01fc3fc279195e54b20d0d6baeebce12e9ecd6b5d1d8e70579a64cfa28e95c6e73d039ce6

  • SSDEEP

    24576:wy9JZNfOUOCFXY+jXwM7kHKR9hWMkv2JFR+V:3rOUOCJY+brkozRw

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

stop

C2

193.233.20.32:4125

Attributes
  • auth_value

    5513676bfbd0dcf527a10a0484422896

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      61eab3811c02885bafa1aade7d09b51b4bab54b9404e6de4670f2b90302553c9

    • Size

      1.0MB

    • MD5

      24822fe3d0265ac13552cde42cc5e74c

    • SHA1

      46c7aade18db5e9eac91625c93518ec7a311e312

    • SHA256

      61eab3811c02885bafa1aade7d09b51b4bab54b9404e6de4670f2b90302553c9

    • SHA512

      0ab26d6488e82cc494680d889d3c891ddc2fd0dcc8b34d5f2062bcf01fc3fc279195e54b20d0d6baeebce12e9ecd6b5d1d8e70579a64cfa28e95c6e73d039ce6

    • SSDEEP

      24576:wy9JZNfOUOCFXY+jXwM7kHKR9hWMkv2JFR+V:3rOUOCJY+brkozRw

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks