General

  • Target

    db2257c1648e3b1b8d9aa55acac5b23f5395446fddf6a75ecf347263e0564c6d

  • Size

    849KB

  • Sample

    230411-rs412sch85

  • MD5

    a3b55ae9e11a9e8957d50df618083b5d

  • SHA1

    528ca0fa216167b1a9afc3dda4f2f0e247fe8985

  • SHA256

    db2257c1648e3b1b8d9aa55acac5b23f5395446fddf6a75ecf347263e0564c6d

  • SHA512

    70d3709c7b4240c36d4c5b5d6655475a7ceaefc464e31dca20bb13eeba9ecdfe995eb940a5a04e537d90b18ab7a713748060acc82f6cf347abe47ec9cdda29dd

  • SSDEEP

    24576:fykYxp4gMR3vX7NObuLGSX1bp50nNWXt9DB3:qkc4gMZObu1X1bp50n0XtBB

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Targets

    • Target

      db2257c1648e3b1b8d9aa55acac5b23f5395446fddf6a75ecf347263e0564c6d

    • Size

      849KB

    • MD5

      a3b55ae9e11a9e8957d50df618083b5d

    • SHA1

      528ca0fa216167b1a9afc3dda4f2f0e247fe8985

    • SHA256

      db2257c1648e3b1b8d9aa55acac5b23f5395446fddf6a75ecf347263e0564c6d

    • SHA512

      70d3709c7b4240c36d4c5b5d6655475a7ceaefc464e31dca20bb13eeba9ecdfe995eb940a5a04e537d90b18ab7a713748060acc82f6cf347abe47ec9cdda29dd

    • SSDEEP

      24576:fykYxp4gMR3vX7NObuLGSX1bp50nNWXt9DB3:qkc4gMZObu1X1bp50n0XtBB

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks