General

  • Target

    4c077833392ee1649de5b3757a8ad83732746d7a6b5d80bfc8016bbfe4d2b501

  • Size

    937KB

  • Sample

    230410-xq7l2sff25

  • MD5

    b34552fc3001c9da00a6f5000a77382c

  • SHA1

    1a0a6b88401e527ba3c2749bd0f5977edca5ee78

  • SHA256

    4c077833392ee1649de5b3757a8ad83732746d7a6b5d80bfc8016bbfe4d2b501

  • SHA512

    5fbdc43f45d9cd5bfc22e9c9e158b2e4836352c8949ed34c48ac621b6bd273cd5ccc1996b4bbeac58374f99b5d3b84c05e6aad8bdb2fd8285a8122c51c1b09a8

  • SSDEEP

    24576:VyJeh+7L8yb/M62i+EHrQRZYocnDSoaTb0a:wJeJyb062i+EHjDSoKb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Targets

    • Target

      4c077833392ee1649de5b3757a8ad83732746d7a6b5d80bfc8016bbfe4d2b501

    • Size

      937KB

    • MD5

      b34552fc3001c9da00a6f5000a77382c

    • SHA1

      1a0a6b88401e527ba3c2749bd0f5977edca5ee78

    • SHA256

      4c077833392ee1649de5b3757a8ad83732746d7a6b5d80bfc8016bbfe4d2b501

    • SHA512

      5fbdc43f45d9cd5bfc22e9c9e158b2e4836352c8949ed34c48ac621b6bd273cd5ccc1996b4bbeac58374f99b5d3b84c05e6aad8bdb2fd8285a8122c51c1b09a8

    • SSDEEP

      24576:VyJeh+7L8yb/M62i+EHrQRZYocnDSoaTb0a:wJeJyb062i+EHjDSoKb

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks