General

  • Target

    c1b3f91bd5fe94df77e3fd9fe870545e7b43839c24411e0b3233f1cb82f11cc8

  • Size

    992KB

  • Sample

    230330-xnmtvsfd2z

  • MD5

    0a43d9aeeb1008a0677ec2e5a813ce3c

  • SHA1

    86b4433fe5d2161ec11a5710888080c77a37731d

  • SHA256

    c1b3f91bd5fe94df77e3fd9fe870545e7b43839c24411e0b3233f1cb82f11cc8

  • SHA512

    33f1ab38b553f11e9bcf70a84026693a485f0c014320ffa0afed9478ce758ce28e76572a8b0894e12397787a41fb69e04d82c286f3615198b350b9a158e6ec2f

  • SSDEEP

    24576:yyIQx5uOcO3I0i6br2mPHcMgaYDFn1GexRp3:ZIWRcQI0i6br22xg3DZ1GexRp

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

lino

C2

176.113.115.145:4125

Attributes
  • auth_value

    ac19251c9237676a0dd7d46d3f536e96

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Targets

    • Target

      c1b3f91bd5fe94df77e3fd9fe870545e7b43839c24411e0b3233f1cb82f11cc8

    • Size

      992KB

    • MD5

      0a43d9aeeb1008a0677ec2e5a813ce3c

    • SHA1

      86b4433fe5d2161ec11a5710888080c77a37731d

    • SHA256

      c1b3f91bd5fe94df77e3fd9fe870545e7b43839c24411e0b3233f1cb82f11cc8

    • SHA512

      33f1ab38b553f11e9bcf70a84026693a485f0c014320ffa0afed9478ce758ce28e76572a8b0894e12397787a41fb69e04d82c286f3615198b350b9a158e6ec2f

    • SSDEEP

      24576:yyIQx5uOcO3I0i6br2mPHcMgaYDFn1GexRp3:ZIWRcQI0i6br22xg3DZ1GexRp

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks