General

  • Target

    b4cddc4e7537a983c2f97fba0e4e49c5b3e8093a32417bb37b3218ad3dc7f447

  • Size

    1.0MB

  • Sample

    230328-xm9x1acf57

  • MD5

    f4b02c8815e045c8d0929b2aec86792e

  • SHA1

    8bfbf994b24ef365b53603f2198d73df5af7e67d

  • SHA256

    b4cddc4e7537a983c2f97fba0e4e49c5b3e8093a32417bb37b3218ad3dc7f447

  • SHA512

    12090ddc228de844e128d4253186e20b0fab427519aa6462f5c6b156e29601d36b5076a4269b724771cb5e2625db3d3364f998f0517918083091e93a61269a06

  • SSDEEP

    24576:RyZIHM+2qrX+1CzhIo575BuhvdbI4Puw+:EZNqqcd3idTPH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

duna

C2

176.113.115.145:4125

Attributes
  • auth_value

    8879c60b4740ac2d7fb8831d4d3c396f

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Targets

    • Target

      b4cddc4e7537a983c2f97fba0e4e49c5b3e8093a32417bb37b3218ad3dc7f447

    • Size

      1.0MB

    • MD5

      f4b02c8815e045c8d0929b2aec86792e

    • SHA1

      8bfbf994b24ef365b53603f2198d73df5af7e67d

    • SHA256

      b4cddc4e7537a983c2f97fba0e4e49c5b3e8093a32417bb37b3218ad3dc7f447

    • SHA512

      12090ddc228de844e128d4253186e20b0fab427519aa6462f5c6b156e29601d36b5076a4269b724771cb5e2625db3d3364f998f0517918083091e93a61269a06

    • SSDEEP

      24576:RyZIHM+2qrX+1CzhIo575BuhvdbI4Puw+:EZNqqcd3idTPH

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks