General

  • Target

    44a8086ff42f1556e64ebb3c5719b1017991b59a9c2b5f7099bfb7876b671628

  • Size

    1.0MB

  • Sample

    230327-cvrq6sbc65

  • MD5

    18f17101a662f196f18b78d2a2b702c4

  • SHA1

    ab14a59e790f37b3d08f3aa490bdb3804d972e4a

  • SHA256

    44a8086ff42f1556e64ebb3c5719b1017991b59a9c2b5f7099bfb7876b671628

  • SHA512

    b540e2404ab11ccf2a9e4febf80c9f551e9b0675d3869cc3368fcd55df25c7ad4b1c2c07389d95a27ccf6bff67c605f5d2bec38f5611191329225bff147be447

  • SSDEEP

    24576:2ynprZOa8KfbqWRp3khchtrS4EIsQIkFryRx3WXEZ:Fpoa82khca4EIsQIkF+73W0

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

reiv

C2

193.233.20.33:4125

Attributes
  • auth_value

    5e0113277ad2cf97a9b7e175007f1c55

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      44a8086ff42f1556e64ebb3c5719b1017991b59a9c2b5f7099bfb7876b671628

    • Size

      1.0MB

    • MD5

      18f17101a662f196f18b78d2a2b702c4

    • SHA1

      ab14a59e790f37b3d08f3aa490bdb3804d972e4a

    • SHA256

      44a8086ff42f1556e64ebb3c5719b1017991b59a9c2b5f7099bfb7876b671628

    • SHA512

      b540e2404ab11ccf2a9e4febf80c9f551e9b0675d3869cc3368fcd55df25c7ad4b1c2c07389d95a27ccf6bff67c605f5d2bec38f5611191329225bff147be447

    • SSDEEP

      24576:2ynprZOa8KfbqWRp3khchtrS4EIsQIkFryRx3WXEZ:Fpoa82khca4EIsQIkF+73W0

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks