General

  • Target

    5df47c0322c6b145f0443d37249df531c1afca905591dcc069f5b171751e1279

  • Size

    936KB

  • Sample

    230410-xfk1asfe49

  • MD5

    9862db7e7e778a7c3ddb0949f012782f

  • SHA1

    a4f0a408d19ae79a8945bdf7d4419c55214ca919

  • SHA256

    5df47c0322c6b145f0443d37249df531c1afca905591dcc069f5b171751e1279

  • SHA512

    4239e36e5df66ee9d38fe1b9ce3101adab62197236ef524ed6d4e80f054e93f5c82e717a0f997bd3c950b68eb85103539b355c47fa9e2529781956f1b966dc86

  • SSDEEP

    24576:gyQ1QTyAQ9QJ0Ior+eSHHIMZvEj9EJU8m8qJNP3gZ:nQQ4Sor+eidS9E28m8qJNI

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Targets

    • Target

      5df47c0322c6b145f0443d37249df531c1afca905591dcc069f5b171751e1279

    • Size

      936KB

    • MD5

      9862db7e7e778a7c3ddb0949f012782f

    • SHA1

      a4f0a408d19ae79a8945bdf7d4419c55214ca919

    • SHA256

      5df47c0322c6b145f0443d37249df531c1afca905591dcc069f5b171751e1279

    • SHA512

      4239e36e5df66ee9d38fe1b9ce3101adab62197236ef524ed6d4e80f054e93f5c82e717a0f997bd3c950b68eb85103539b355c47fa9e2529781956f1b966dc86

    • SSDEEP

      24576:gyQ1QTyAQ9QJ0Ior+eSHHIMZvEj9EJU8m8qJNP3gZ:nQQ4Sor+eidS9E28m8qJNI

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks