General

  • Target

    97a7ca29eed0366cca3daa4cefc16d045d32980349debb39933155a286ab47f2

  • Size

    940KB

  • Sample

    230410-zh5tlahf81

  • MD5

    e0b7dbd2609cd6a54df5f5c2d8891e7e

  • SHA1

    20f84c451d5d6da20c6e4a2d99d86564ac580aa1

  • SHA256

    97a7ca29eed0366cca3daa4cefc16d045d32980349debb39933155a286ab47f2

  • SHA512

    f9f62401f406ab35f7a9c8b066b7dc0af11c69ea29275dfad7c23115fd3702702dc842dc0a2d930cb75cb38c81c3c5fce54112c32a62fa8b1acfe32f3459ebd0

  • SSDEEP

    24576:JyN2O/3uXKzvnn/p87H+PHxIu8F8NDbwE:8c8uSe7H+ps8hbw

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Targets

    • Target

      97a7ca29eed0366cca3daa4cefc16d045d32980349debb39933155a286ab47f2

    • Size

      940KB

    • MD5

      e0b7dbd2609cd6a54df5f5c2d8891e7e

    • SHA1

      20f84c451d5d6da20c6e4a2d99d86564ac580aa1

    • SHA256

      97a7ca29eed0366cca3daa4cefc16d045d32980349debb39933155a286ab47f2

    • SHA512

      f9f62401f406ab35f7a9c8b066b7dc0af11c69ea29275dfad7c23115fd3702702dc842dc0a2d930cb75cb38c81c3c5fce54112c32a62fa8b1acfe32f3459ebd0

    • SSDEEP

      24576:JyN2O/3uXKzvnn/p87H+PHxIu8F8NDbwE:8c8uSe7H+ps8hbw

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks