General

  • Target

    4642494a01f0300d40dcd874ef34b5290b65f072bb5c499b14ad49051da363af

  • Size

    977KB

  • Sample

    230403-jhsk9sdd89

  • MD5

    10a5ed1d65df4e0e9f0b7c71b483d3ef

  • SHA1

    75105b97e64021fabd44d21fbe0e86661bc2252c

  • SHA256

    4642494a01f0300d40dcd874ef34b5290b65f072bb5c499b14ad49051da363af

  • SHA512

    ff1e13023429304f6a57fee492d97c7a70974b9c766830862d5391480c997c3683c01fd4cc721d4513cc1ea426281acf6c42949feb6c7160a04ea02182ca83ae

  • SSDEEP

    24576:Dyv40N3Lz6fFNl1bkxATIZV52uet4gOdhzBdgCe:WLN7efFNDIxfZ/2qjxdg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nord

C2

176.113.115.145:4125

Attributes
  • auth_value

    ebb7d38cdbd7c83cf6363ef3feb3a530

Extracted

Family

amadey

Version

3.69

C2

193.233.20.29/games/category/index.php

Targets

    • Target

      4642494a01f0300d40dcd874ef34b5290b65f072bb5c499b14ad49051da363af

    • Size

      977KB

    • MD5

      10a5ed1d65df4e0e9f0b7c71b483d3ef

    • SHA1

      75105b97e64021fabd44d21fbe0e86661bc2252c

    • SHA256

      4642494a01f0300d40dcd874ef34b5290b65f072bb5c499b14ad49051da363af

    • SHA512

      ff1e13023429304f6a57fee492d97c7a70974b9c766830862d5391480c997c3683c01fd4cc721d4513cc1ea426281acf6c42949feb6c7160a04ea02182ca83ae

    • SSDEEP

      24576:Dyv40N3Lz6fFNl1bkxATIZV52uet4gOdhzBdgCe:WLN7efFNDIxfZ/2qjxdg

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks