General

  • Target

    8fd3b9b2800557b3e8a05ffd0f5c5ab1b5e211a2303a37cf7110d8b39b232801

  • Size

    1002KB

  • Sample

    230401-cmsnhafd23

  • MD5

    0948a728bb4fc4bcb60db60f15ec44ab

  • SHA1

    4a288d3b666cfe7c4ca191f1140e4350474df992

  • SHA256

    8fd3b9b2800557b3e8a05ffd0f5c5ab1b5e211a2303a37cf7110d8b39b232801

  • SHA512

    43e0faf36dfbfc6dcb583f7fe1192aebb05946d9d801da776be8a2d6efd8f4525204c5e0a562402ec9a5ddb806ccd48f92bc3c320881c47e8f41613876036ace

  • SSDEEP

    24576:KyXuXNi0Qy8wP59ITU0jYqz7YRsJ2VvzknEa:RedrQDwB6azkn

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

lift

C2

176.113.115.145:4125

Attributes
  • auth_value

    94f33c242a83de9dcc729e29ec435dfb

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Targets

    • Target

      8fd3b9b2800557b3e8a05ffd0f5c5ab1b5e211a2303a37cf7110d8b39b232801

    • Size

      1002KB

    • MD5

      0948a728bb4fc4bcb60db60f15ec44ab

    • SHA1

      4a288d3b666cfe7c4ca191f1140e4350474df992

    • SHA256

      8fd3b9b2800557b3e8a05ffd0f5c5ab1b5e211a2303a37cf7110d8b39b232801

    • SHA512

      43e0faf36dfbfc6dcb583f7fe1192aebb05946d9d801da776be8a2d6efd8f4525204c5e0a562402ec9a5ddb806ccd48f92bc3c320881c47e8f41613876036ace

    • SSDEEP

      24576:KyXuXNi0Qy8wP59ITU0jYqz7YRsJ2VvzknEa:RedrQDwB6azkn

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks