General

  • Target

    c406bbf360ec0ac9e0e658de90c6b94b8a5216b624293b8da73baa9d0925623c

  • Size

    1005KB

  • Sample

    230328-c2vreaad7v

  • MD5

    ecb050e69d3b317985ee7abf0a7d91dc

  • SHA1

    99c350cc9f51a93379085bb69f2497af2af9a587

  • SHA256

    c406bbf360ec0ac9e0e658de90c6b94b8a5216b624293b8da73baa9d0925623c

  • SHA512

    10d3cb956b02ae2b7946818b004e6de03c74fa22a7a29a9532ce38cd057abb52f313b8512872dafc337c249c293f9dfebdfa5b813ef91f48b02408bf667ed4dd

  • SSDEEP

    24576:cypSAepGSXgp863WGAGabzsRsPgWOaMA60fkScJ:LuXoAGABbwsbmtC

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Targets

    • Target

      c406bbf360ec0ac9e0e658de90c6b94b8a5216b624293b8da73baa9d0925623c

    • Size

      1005KB

    • MD5

      ecb050e69d3b317985ee7abf0a7d91dc

    • SHA1

      99c350cc9f51a93379085bb69f2497af2af9a587

    • SHA256

      c406bbf360ec0ac9e0e658de90c6b94b8a5216b624293b8da73baa9d0925623c

    • SHA512

      10d3cb956b02ae2b7946818b004e6de03c74fa22a7a29a9532ce38cd057abb52f313b8512872dafc337c249c293f9dfebdfa5b813ef91f48b02408bf667ed4dd

    • SSDEEP

      24576:cypSAepGSXgp863WGAGabzsRsPgWOaMA60fkScJ:LuXoAGABbwsbmtC

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks