General

  • Target

    setup.exe

  • Size

    1000KB

  • Sample

    230401-cpj45sgf7w

  • MD5

    0821d852f13c8671074a8d94cb18d2f2

  • SHA1

    93cf86d9428ae2ab841b0070fe78d60e4d13e241

  • SHA256

    a355678a416828f97937470eaf6a372af78e0073bd985f5cd80e17f270f04f74

  • SHA512

    2710ca07329d383ae2ab1886f2b42606e2700782c046d65099b79e056569d5adcc013b68c1e73242bdf58139a45eebc6be6f682d495dd88bd31c662c24496fbf

  • SSDEEP

    24576:PyxTmOEWPNUI8R0mu1+AzQD205xPXPEo8ctzyMCdC7B7oAk:admvWVU5iC8QD20fOcpyrdC7ZP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

lift

C2

176.113.115.145:4125

Attributes
  • auth_value

    94f33c242a83de9dcc729e29ec435dfb

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Extracted

Family

aurora

C2

212.87.204.93:8081

Targets

    • Target

      setup.exe

    • Size

      1000KB

    • MD5

      0821d852f13c8671074a8d94cb18d2f2

    • SHA1

      93cf86d9428ae2ab841b0070fe78d60e4d13e241

    • SHA256

      a355678a416828f97937470eaf6a372af78e0073bd985f5cd80e17f270f04f74

    • SHA512

      2710ca07329d383ae2ab1886f2b42606e2700782c046d65099b79e056569d5adcc013b68c1e73242bdf58139a45eebc6be6f682d495dd88bd31c662c24496fbf

    • SSDEEP

      24576:PyxTmOEWPNUI8R0mu1+AzQD205xPXPEo8ctzyMCdC7B7oAk:admvWVU5iC8QD20fOcpyrdC7ZP

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks