General

  • Target

    6015ebccc62055031ce0a2503cd0d0f0f0808814f882cbab7fa046371341fe6b

  • Size

    1008KB

  • Sample

    230402-2s588acg5t

  • MD5

    f4ac902d087ae53c49cf4c1f1d61cf5e

  • SHA1

    7c9d8a5af04e10c92738c2674f28acc92e26f75b

  • SHA256

    6015ebccc62055031ce0a2503cd0d0f0f0808814f882cbab7fa046371341fe6b

  • SHA512

    d1bb932ac58662bff43eb2c48736c48fcd50b1333654f7df4bccf08d60a1c57851d7f67ba6a629f89528770b9207581c832241c88a0a5db4af40cbee3a7cc8d8

  • SSDEEP

    24576:ay5zrVtBmbpqMwGGmL5yl4z5fgS8sEEX1WA7w5V1ia/xS:h1VtY9qXOBzBXEs1WAOV1

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nord

C2

176.113.115.145:4125

Attributes
  • auth_value

    ebb7d38cdbd7c83cf6363ef3feb3a530

Extracted

Family

amadey

Version

3.69

C2

193.233.20.29/games/category/index.php

Targets

    • Target

      6015ebccc62055031ce0a2503cd0d0f0f0808814f882cbab7fa046371341fe6b

    • Size

      1008KB

    • MD5

      f4ac902d087ae53c49cf4c1f1d61cf5e

    • SHA1

      7c9d8a5af04e10c92738c2674f28acc92e26f75b

    • SHA256

      6015ebccc62055031ce0a2503cd0d0f0f0808814f882cbab7fa046371341fe6b

    • SHA512

      d1bb932ac58662bff43eb2c48736c48fcd50b1333654f7df4bccf08d60a1c57851d7f67ba6a629f89528770b9207581c832241c88a0a5db4af40cbee3a7cc8d8

    • SSDEEP

      24576:ay5zrVtBmbpqMwGGmL5yl4z5fgS8sEEX1WA7w5V1ia/xS:h1VtY9qXOBzBXEs1WAOV1

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks