General

  • Target

    51119439df293d0219fff3a3f9cf7b61d52089ab0d40aea159dd1a1048581d88

  • Size

    1008KB

  • Sample

    230402-q25hhagf37

  • MD5

    44450c76f0aa5aa043b3fb333d66c557

  • SHA1

    bc514fde10e2993f5e98ce90b4a0cb1f0bfa68ad

  • SHA256

    51119439df293d0219fff3a3f9cf7b61d52089ab0d40aea159dd1a1048581d88

  • SHA512

    9ae1fecfd3addb779c6982336a3ff16d64ee142834f026b16dcb19524175984e05b97afc7f80d092f923dbcf13e6ed2819cadfcef40a2794ba1e6aa53061d002

  • SSDEEP

    24576:/ymEViJw54KqbaExeYF10xUqUdooLdgQHVXcO5rRP1YDYsWToqp8:KmE0J24vbTZ6HUdoorHVcO5r3DsJ4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nord

C2

176.113.115.145:4125

Attributes
  • auth_value

    ebb7d38cdbd7c83cf6363ef3feb3a530

Extracted

Family

amadey

Version

3.69

C2

193.233.20.29/games/category/index.php

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Targets

    • Target

      51119439df293d0219fff3a3f9cf7b61d52089ab0d40aea159dd1a1048581d88

    • Size

      1008KB

    • MD5

      44450c76f0aa5aa043b3fb333d66c557

    • SHA1

      bc514fde10e2993f5e98ce90b4a0cb1f0bfa68ad

    • SHA256

      51119439df293d0219fff3a3f9cf7b61d52089ab0d40aea159dd1a1048581d88

    • SHA512

      9ae1fecfd3addb779c6982336a3ff16d64ee142834f026b16dcb19524175984e05b97afc7f80d092f923dbcf13e6ed2819cadfcef40a2794ba1e6aa53061d002

    • SSDEEP

      24576:/ymEViJw54KqbaExeYF10xUqUdooLdgQHVXcO5rRP1YDYsWToqp8:KmE0J24vbTZ6HUdoorHVcO5r3DsJ4

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks