General

  • Target

    f5dfec931e19e6738eaa2445958ccf9a.exe

  • Size

    1.0MB

  • Sample

    230327-13xt6afe66

  • MD5

    f5dfec931e19e6738eaa2445958ccf9a

  • SHA1

    e6cf70f7b43f4fdf5beb10eacf015df92567e6e4

  • SHA256

    8a7d599d3de64901276d2d1cc58da339185637929661f4aaa44171905ddaf1c2

  • SHA512

    b61281eaee6e4027c98fcf9c0f77a959282cb658529ff7e520ec91f3203e0ab6a97550b48a82929aa00e55caf29b1c2ebb7c60cb1ac6dcf1c02291ce944895f1

  • SSDEEP

    24576:IyWnTINN9cJM2QcGEM06FtaJ/Smc4kEAf7RCKypj+XMQoc8:PW0cLlLMOSmWRf7R6eMS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      f5dfec931e19e6738eaa2445958ccf9a.exe

    • Size

      1.0MB

    • MD5

      f5dfec931e19e6738eaa2445958ccf9a

    • SHA1

      e6cf70f7b43f4fdf5beb10eacf015df92567e6e4

    • SHA256

      8a7d599d3de64901276d2d1cc58da339185637929661f4aaa44171905ddaf1c2

    • SHA512

      b61281eaee6e4027c98fcf9c0f77a959282cb658529ff7e520ec91f3203e0ab6a97550b48a82929aa00e55caf29b1c2ebb7c60cb1ac6dcf1c02291ce944895f1

    • SSDEEP

      24576:IyWnTINN9cJM2QcGEM06FtaJ/Smc4kEAf7RCKypj+XMQoc8:PW0cLlLMOSmWRf7R6eMS

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks