General

  • Target

    849376bde5159dad82b0d80a88f99c32.bin

  • Size

    944KB

  • Sample

    230401-b2dbpafb32

  • MD5

    ef0bf317ea4db73db17c032d4489a2fd

  • SHA1

    0aca72db25d406409d3c5588fa9cdcbaeb97bce3

  • SHA256

    9f5f39c3287851354aa256a2e3d75a365ba9f078f56508943e995ac1dd315972

  • SHA512

    2543da63b1a39481e0dd4ea65f9caeeb0c2d0d5ce776ee14dc174f31c3e350fec07d361ecb6787c6d70b818bdf2b954678f77d48feb256a54f5584b7d0a347b7

  • SSDEEP

    24576:sdv4N9yfz8gUB2zCvPuOYzuAqrj3R/Gsz4vJ3H:sKN9VgU4Bdqrjh/Gsz2H

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

lino

C2

176.113.115.145:4125

Attributes
  • auth_value

    ac19251c9237676a0dd7d46d3f536e96

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Extracted

Family

aurora

C2

212.87.204.93:8081

Targets

    • Target

      75531bcd2c92c9ef3d34c1cfd40749827c2d6c4e85a2552e16b6302fb3bdd345.exe

    • Size

      988KB

    • MD5

      849376bde5159dad82b0d80a88f99c32

    • SHA1

      8631788c0494ed2161074c4e486ad4ec8aef0ffe

    • SHA256

      75531bcd2c92c9ef3d34c1cfd40749827c2d6c4e85a2552e16b6302fb3bdd345

    • SHA512

      a1f989b491feda99cb6375df48311022327c4a6bbf8f031932895888e2f58060366af0d61638a09993862f50e0f73f0df334e88ddda2fae15e31b2439a00e168

    • SSDEEP

      24576:nybUvbSj+I+tpTnB5rhpfnFPn+r6wlsrJpVG0M7k:yyby+IUJzXUr3arJrNY

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks