General

  • Target

    99084c6df877959ab0532009d12bb8564ec1942f622fa992ecdad537d9216038

  • Size

    1.0MB

  • Sample

    230327-z3nqtahc8y

  • MD5

    f73082b707e883abb60a417a67cd0233

  • SHA1

    bfa0227fc1be400650a333306cd2bb97a8ab12ca

  • SHA256

    99084c6df877959ab0532009d12bb8564ec1942f622fa992ecdad537d9216038

  • SHA512

    f13cb154088d67813d8b0e03ed3accdb54f3f0bb005ed60b90f1945b349bdaac94e1d5707b7938667802e1f744429de1420dfa75034bfdf867c342adb8ab1ed7

  • SSDEEP

    24576:JyudSHIASyVCNldjX5QE8Atr9beV6+gu+YaJ9bWRk6:8uPASyedvNrUgjTrbWRk

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      99084c6df877959ab0532009d12bb8564ec1942f622fa992ecdad537d9216038

    • Size

      1.0MB

    • MD5

      f73082b707e883abb60a417a67cd0233

    • SHA1

      bfa0227fc1be400650a333306cd2bb97a8ab12ca

    • SHA256

      99084c6df877959ab0532009d12bb8564ec1942f622fa992ecdad537d9216038

    • SHA512

      f13cb154088d67813d8b0e03ed3accdb54f3f0bb005ed60b90f1945b349bdaac94e1d5707b7938667802e1f744429de1420dfa75034bfdf867c342adb8ab1ed7

    • SSDEEP

      24576:JyudSHIASyVCNldjX5QE8Atr9beV6+gu+YaJ9bWRk6:8uPASyedvNrUgjTrbWRk

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks