General

  • Target

    5e7c5b6487f6d543fcf04767ecb616ac.bin

  • Size

    995KB

  • Sample

    230328-bywnvsgc69

  • MD5

    715157948a28352b505c64b2fc53c904

  • SHA1

    55919d60c41c19d528b4e17c6bc7c29162171501

  • SHA256

    d86795f4789d57a7355afd89f5db02e3b5c2b404a413ddcbd0d6924e94c52d02

  • SHA512

    a3bd6e5740e9e16995fd786aabd03c8b2ff7b1b23bd7dfb3afc5ca5d2100ccb6705e2722378dc2d2b31edb369ca5a9c03a677df33f489725fa1e122059419f8d

  • SSDEEP

    24576:oF7Ix2GWTScIymqJS3cZoihVBzOYWwclt10bKjeZFnyhYabBv:Gcx2GWTjhmP3EoiPBzHclriEefnymadv

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

braza

C2

193.233.20.32:4125

Attributes
  • auth_value

    ebe61b54deeef75cf8466416c0857088

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      eda79afb5d162cda849d6b683b530aa45158cefb502adc56064993d3110289ac.exe

    • Size

      1.0MB

    • MD5

      5e7c5b6487f6d543fcf04767ecb616ac

    • SHA1

      88b0c5f020b5b65415ba3029ededfdaef92a6a85

    • SHA256

      eda79afb5d162cda849d6b683b530aa45158cefb502adc56064993d3110289ac

    • SHA512

      74a628b1e314354d7ee09647c5b030052e6159ed2c4d2a981cbb090541b1702dcea016e2a1282ca2ab58b2e02eeb962ee6e9fcb9bb62211162270c08f779a3f8

    • SSDEEP

      24576:Wy/dKJDSoz1G4YfR5Hde7gaFRkMW5EqiibubxUpf:l/dKQoz1G4u9ecqkVUs4S

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks