General

  • Target

    acdeb4f783969f4983684547102a08b8db8a48c9eea271acb3886c0893a8337a

  • Size

    1002KB

  • Sample

    230401-ekbcjshb4z

  • MD5

    d78ec6139d3de214fa8093742bc6fd91

  • SHA1

    69e7c33d8efea3175d2b9e5c5c46543bae8060b2

  • SHA256

    acdeb4f783969f4983684547102a08b8db8a48c9eea271acb3886c0893a8337a

  • SHA512

    3e223c1dc3e626120f8fd3b35ab248a2ba77847c4ce4523023e0276ad5c560ab959ba37c93348a3c36ab67f160d472db1182571ef09bb5ae34291b48d7ba296b

  • SSDEEP

    24576:LyGxnWPYDRcl6jy+eQdU+4yQRb4Tp+JciUwcGiys+W:+GxsYDRxy+ix2is

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

lift

C2

176.113.115.145:4125

Attributes
  • auth_value

    94f33c242a83de9dcc729e29ec435dfb

Extracted

Family

amadey

Version

3.69

C2

193.233.20.36/joomla/index.php

Targets

    • Target

      acdeb4f783969f4983684547102a08b8db8a48c9eea271acb3886c0893a8337a

    • Size

      1002KB

    • MD5

      d78ec6139d3de214fa8093742bc6fd91

    • SHA1

      69e7c33d8efea3175d2b9e5c5c46543bae8060b2

    • SHA256

      acdeb4f783969f4983684547102a08b8db8a48c9eea271acb3886c0893a8337a

    • SHA512

      3e223c1dc3e626120f8fd3b35ab248a2ba77847c4ce4523023e0276ad5c560ab959ba37c93348a3c36ab67f160d472db1182571ef09bb5ae34291b48d7ba296b

    • SSDEEP

      24576:LyGxnWPYDRcl6jy+eQdU+4yQRb4Tp+JciUwcGiys+W:+GxsYDRxy+ix2is

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks