General

  • Target

    4a7c39301b4eb4d0d04265c6bbe1f4f0.bin

  • Size

    979KB

  • Sample

    230328-byg6gaab41

  • MD5

    c3dcd2f23bcd20d19190418161f77745

  • SHA1

    aafc6d0261737ad2b0d3f6071ec42d8ba3dd9362

  • SHA256

    e591d31b30828d69b284e7743460d10874735e7d191a34e260defe62f927e5d9

  • SHA512

    4b44f269e6ec51638592bddef2e28e72fcdfeef139ccc1f6aada3ec04782d7808a6c2518d0d497e66e497874af4658931614171c9c28b84d199d07f5f82678cf

  • SSDEEP

    24576:AHw6gERSQ5/qUkOjH9aaXuurWEcfYXQeZWzDrhmyf:AHcQ5/qc9curWEy2vZWzHv

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

reiv

C2

193.233.20.33:4125

Attributes
  • auth_value

    5e0113277ad2cf97a9b7e175007f1c55

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      6998af1d9f903ff953b4d0ad8ad7fbcc9a257f786d108a13a0a3b308a4e1c3b7.bin

    • Size

      1024KB

    • MD5

      4a7c39301b4eb4d0d04265c6bbe1f4f0

    • SHA1

      3b800fc7cd7561677ccf080d4b24cbcb0172f183

    • SHA256

      6998af1d9f903ff953b4d0ad8ad7fbcc9a257f786d108a13a0a3b308a4e1c3b7

    • SHA512

      9fb8e7e6be54215800e097b4459505385eae34e80d009b9a286e773967ef6fbe81c7827e8e44dd74e0e20667463ace8eee205350291948d21b66f50db4d81470

    • SSDEEP

      24576:ZyzgdjCYi7MRslgaa6BrJk51qEmMNv7wtUfgYko0WNWZtZIE:Mzg9C7gqiaNBu7mMhBpUZtW

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks