General

  • Target

    992e2716624799ad3f3587887403769a2d1912befb50c3ae1904b0f9a52f46be

  • Size

    987KB

  • Sample

    230329-a5tx6sfg8x

  • MD5

    42bc9b8139fba3c248c24e77a5280834

  • SHA1

    f5f98733853296de1e22b5e86ed4b40bd1e0a32a

  • SHA256

    992e2716624799ad3f3587887403769a2d1912befb50c3ae1904b0f9a52f46be

  • SHA512

    0fd25f18a736f79c46f9c40f69fa3223f5ee362abde7ffa4219ea3e61dc188843b613524abd1fee0fad00c957b38b6c9cd5ed5f54af229f3d547c378d465e698

  • SSDEEP

    24576:Ey7dW4LVJe2a/jcDgnzC5ztqZe4/6Y8ba3pxHvNOUGCK:T7d5LVJEjcvVtqw467baZxlOUGC

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nado

C2

176.113.115.145:4125

Attributes
  • auth_value

    a648e365d8e0df895a84152ad68ffc56

Extracted

Family

amadey

Version

3.68

C2

62.204.41.87/joomla/index.php

Targets

    • Target

      992e2716624799ad3f3587887403769a2d1912befb50c3ae1904b0f9a52f46be

    • Size

      987KB

    • MD5

      42bc9b8139fba3c248c24e77a5280834

    • SHA1

      f5f98733853296de1e22b5e86ed4b40bd1e0a32a

    • SHA256

      992e2716624799ad3f3587887403769a2d1912befb50c3ae1904b0f9a52f46be

    • SHA512

      0fd25f18a736f79c46f9c40f69fa3223f5ee362abde7ffa4219ea3e61dc188843b613524abd1fee0fad00c957b38b6c9cd5ed5f54af229f3d547c378d465e698

    • SSDEEP

      24576:Ey7dW4LVJe2a/jcDgnzC5ztqZe4/6Y8ba3pxHvNOUGCK:T7d5LVJEjcvVtqw467baZxlOUGC

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks