General

  • Target

    ec58e8343e86d189c139b88fa82c69ac4fd49f017779af5d09527ab907dfd5a1

  • Size

    1.0MB

  • Sample

    230327-y5arashb4y

  • MD5

    f2a464cd449f6cb4dcef1817ff9cc5e9

  • SHA1

    5c5e84c9f339858990bd98c4c460d645f8df4e63

  • SHA256

    ec58e8343e86d189c139b88fa82c69ac4fd49f017779af5d09527ab907dfd5a1

  • SHA512

    43973c1062016788d8753ff4477b25d6d2ba98011e47705400e49bfb0d3b4fc2bdc1729d902fba6535b07e5201cf6306921fce521c60a5893510d1148d56d8d3

  • SSDEEP

    24576:uy7sx+gOxhPOmIV9EaS6Yv5C36cf0camN/83e8:9y+VhPQfEaS6803h0cz/4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      ec58e8343e86d189c139b88fa82c69ac4fd49f017779af5d09527ab907dfd5a1

    • Size

      1.0MB

    • MD5

      f2a464cd449f6cb4dcef1817ff9cc5e9

    • SHA1

      5c5e84c9f339858990bd98c4c460d645f8df4e63

    • SHA256

      ec58e8343e86d189c139b88fa82c69ac4fd49f017779af5d09527ab907dfd5a1

    • SHA512

      43973c1062016788d8753ff4477b25d6d2ba98011e47705400e49bfb0d3b4fc2bdc1729d902fba6535b07e5201cf6306921fce521c60a5893510d1148d56d8d3

    • SSDEEP

      24576:uy7sx+gOxhPOmIV9EaS6Yv5C36cf0camN/83e8:9y+VhPQfEaS6803h0cz/4

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks