General

  • Target

    f26399e1993b50e872d64f17f4b0abde913cd3ae7e808b24f5c9ffd234554760

  • Size

    924KB

  • Sample

    230411-dw1adaab69

  • MD5

    07877d504abf338f8a3d914b25be6b45

  • SHA1

    46facff1d3d019b50814632f05816af3b8a3d10c

  • SHA256

    f26399e1993b50e872d64f17f4b0abde913cd3ae7e808b24f5c9ffd234554760

  • SHA512

    b3c06d5725788899268cc1dfdc6f5f01643a2b4c4bd29f75c2842d28114a62d470a1f46bf8b52bb8ef6993daf374be9b9aef5c842881d0e6b11019d4fefb028b

  • SSDEEP

    24576:JyVhUYRbBL0eGLLpJU5WUMOatHndJ8507ZdXHr1:8VxBL0eoPU5WUwZnIs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nahui

C2

176.113.115.145:4125

Attributes
  • auth_value

    b9ed10946d21e28d58d0c72c535cde6f

Targets

    • Target

      f26399e1993b50e872d64f17f4b0abde913cd3ae7e808b24f5c9ffd234554760

    • Size

      924KB

    • MD5

      07877d504abf338f8a3d914b25be6b45

    • SHA1

      46facff1d3d019b50814632f05816af3b8a3d10c

    • SHA256

      f26399e1993b50e872d64f17f4b0abde913cd3ae7e808b24f5c9ffd234554760

    • SHA512

      b3c06d5725788899268cc1dfdc6f5f01643a2b4c4bd29f75c2842d28114a62d470a1f46bf8b52bb8ef6993daf374be9b9aef5c842881d0e6b11019d4fefb028b

    • SSDEEP

      24576:JyVhUYRbBL0eGLLpJU5WUMOatHndJ8507ZdXHr1:8VxBL0eoPU5WUwZnIs

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks