General

  • Target

    6b7d86171ed72cb7b39075f781ddf025f02f6edeb77dd99a34dded045394a46b

  • Size

    789KB

  • Sample

    230411-arablshd83

  • MD5

    f9e7cf7d922514a6b80b98681b6726a6

  • SHA1

    ca1e638c448dc466b50c6a891eb3f013153d907e

  • SHA256

    6b7d86171ed72cb7b39075f781ddf025f02f6edeb77dd99a34dded045394a46b

  • SHA512

    03b656d1e5a1b6fea8d79402123d91e6fa5f49dff92f8a17986286d48fa94cc118f520b5602844c39a42f1f2c428966301d73ee8c1b9b96580ab9da50d6f4b69

  • SSDEEP

    24576:EyeLMnMcDEEku08KH4f9NOBb8j7GQKc4oDsYnA:TbMyEEJ0fYFwxHQ7sYn

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nahui

C2

176.113.115.145:4125

Attributes
  • auth_value

    b9ed10946d21e28d58d0c72c535cde6f

Targets

    • Target

      6b7d86171ed72cb7b39075f781ddf025f02f6edeb77dd99a34dded045394a46b

    • Size

      789KB

    • MD5

      f9e7cf7d922514a6b80b98681b6726a6

    • SHA1

      ca1e638c448dc466b50c6a891eb3f013153d907e

    • SHA256

      6b7d86171ed72cb7b39075f781ddf025f02f6edeb77dd99a34dded045394a46b

    • SHA512

      03b656d1e5a1b6fea8d79402123d91e6fa5f49dff92f8a17986286d48fa94cc118f520b5602844c39a42f1f2c428966301d73ee8c1b9b96580ab9da50d6f4b69

    • SSDEEP

      24576:EyeLMnMcDEEku08KH4f9NOBb8j7GQKc4oDsYnA:TbMyEEJ0fYFwxHQ7sYn

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks