General

  • Target

    3d2b889794f8052d59c25d35d8d65d847f26e7e5093ceaf96a4f739be7699f92

  • Size

    844KB

  • Sample

    230411-lzaswsdd6x

  • MD5

    9c60b06d81976bb99030a22a861215c6

  • SHA1

    b7961c93062099e51ee88531e018186801b282e4

  • SHA256

    3d2b889794f8052d59c25d35d8d65d847f26e7e5093ceaf96a4f739be7699f92

  • SHA512

    d45faea1126dd5514e67f6036896d9794aa5c64ce7f775013d48fed7179bef9c5c90bf2d58e65d177b6417939a93547eeb419ba1ebfb62f3b9397fffecf5973a

  • SSDEEP

    24576:6yifNg7awVSltrm6rgvaT7XqWHi7pjNp/QbyxZJ:BHmakmA2n1/CWZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nahui

C2

176.113.115.145:4125

Attributes
  • auth_value

    b9ed10946d21e28d58d0c72c535cde6f

Extracted

Family

amadey

Version

3.70

C2

77.91.124.207/plays/chapter/index.php

Targets

    • Target

      3d2b889794f8052d59c25d35d8d65d847f26e7e5093ceaf96a4f739be7699f92

    • Size

      844KB

    • MD5

      9c60b06d81976bb99030a22a861215c6

    • SHA1

      b7961c93062099e51ee88531e018186801b282e4

    • SHA256

      3d2b889794f8052d59c25d35d8d65d847f26e7e5093ceaf96a4f739be7699f92

    • SHA512

      d45faea1126dd5514e67f6036896d9794aa5c64ce7f775013d48fed7179bef9c5c90bf2d58e65d177b6417939a93547eeb419ba1ebfb62f3b9397fffecf5973a

    • SSDEEP

      24576:6yifNg7awVSltrm6rgvaT7XqWHi7pjNp/QbyxZJ:BHmakmA2n1/CWZ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks