Resubmissions

11/04/2023, 15:50

230411-s9y2ssfa7w 10

11/04/2023, 15:43

230411-s52l5add36 10

General

  • Target

    325d284ad074ce2521d02593294e7baa5ec1a7a50a65716ffa1a47e12af14d9f

  • Size

    1.1MB

  • Sample

    230411-s9y2ssfa7w

  • MD5

    7d75ee6c7be8714f51b205dc9b5c075f

  • SHA1

    7f839f03b0593e5f3ab412611a7b3ea3fe0c7e18

  • SHA256

    325d284ad074ce2521d02593294e7baa5ec1a7a50a65716ffa1a47e12af14d9f

  • SHA512

    de585c5570f08ae9149a512f6ff722a03845698bbda363c2319a470a5ab1f3583574f4f5e89f9d7fdf3ed5934868e7ef8645a88c13fdb104d2dffa85f2c10dbf

  • SSDEEP

    24576:uynWbPCtdO+XByC9+eq2FJf/3pL8MdxvEfnqonJMJYQ0P:93LO+XEVeq2FJ35jxcfnqaJMJYQ0

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      325d284ad074ce2521d02593294e7baa5ec1a7a50a65716ffa1a47e12af14d9f

    • Size

      1.1MB

    • MD5

      7d75ee6c7be8714f51b205dc9b5c075f

    • SHA1

      7f839f03b0593e5f3ab412611a7b3ea3fe0c7e18

    • SHA256

      325d284ad074ce2521d02593294e7baa5ec1a7a50a65716ffa1a47e12af14d9f

    • SHA512

      de585c5570f08ae9149a512f6ff722a03845698bbda363c2319a470a5ab1f3583574f4f5e89f9d7fdf3ed5934868e7ef8645a88c13fdb104d2dffa85f2c10dbf

    • SSDEEP

      24576:uynWbPCtdO+XByC9+eq2FJf/3pL8MdxvEfnqonJMJYQ0P:93LO+XEVeq2FJ35jxcfnqaJMJYQ0

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks