General

  • Target

    63d5221aded75423c19646a31de24def8cb748b9fa6800b25afca307fbc638bc

  • Size

    989KB

  • Sample

    230328-31xsgsdh97

  • MD5

    e93683ce5f314ae916baa7e644087034

  • SHA1

    f5e13534a094889603300e0fa722edf7169ce50d

  • SHA256

    63d5221aded75423c19646a31de24def8cb748b9fa6800b25afca307fbc638bc

  • SHA512

    aecd5fd23b11b571c57fb8a4f94a2bc374cbb3567a766d3422c008b6710653f9bae4e3fe5fc2f74370c7d4ee82901d2f58b4be1bcbda2de85bfacab3993283f0

  • SSDEEP

    24576:/yhYM9zaxU/6f/+h5kAn0oudldYco4f5Vg8EVVu/+3skGm:KhYGzRY+h5kVou9ToiVNEVVu/Cs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nado

C2

176.113.115.145:4125

Attributes
  • auth_value

    a648e365d8e0df895a84152ad68ffc56

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Targets

    • Target

      63d5221aded75423c19646a31de24def8cb748b9fa6800b25afca307fbc638bc

    • Size

      989KB

    • MD5

      e93683ce5f314ae916baa7e644087034

    • SHA1

      f5e13534a094889603300e0fa722edf7169ce50d

    • SHA256

      63d5221aded75423c19646a31de24def8cb748b9fa6800b25afca307fbc638bc

    • SHA512

      aecd5fd23b11b571c57fb8a4f94a2bc374cbb3567a766d3422c008b6710653f9bae4e3fe5fc2f74370c7d4ee82901d2f58b4be1bcbda2de85bfacab3993283f0

    • SSDEEP

      24576:/yhYM9zaxU/6f/+h5kAn0oudldYco4f5Vg8EVVu/+3skGm:KhYGzRY+h5kVou9ToiVNEVVu/Cs

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks