General

  • Target

    bb8395e0d203dc6529519036ed32b8ece59fa805dc56b5215027e296cc12ad32

  • Size

    854KB

  • Sample

    230411-z1z13afd93

  • MD5

    df70e76f6c2ffbf6e5957a38f8a37a5f

  • SHA1

    e2fe2ba4175e5685c8a4c22f38acc875eec771a2

  • SHA256

    bb8395e0d203dc6529519036ed32b8ece59fa805dc56b5215027e296cc12ad32

  • SHA512

    acc47dd3ff283a2763f7092a0bc1c6f41fc458c935b7d5056f75e038d579de11c86afc63921b9642a4a93ce6ce5cdd845db295c7de85d38a34749cc813f41dbf

  • SSDEEP

    24576:GytbDTvY6siRfE5E/cPKrOq+dF6w96YLU:VtbDkORMi/cirp01tL

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Targets

    • Target

      bb8395e0d203dc6529519036ed32b8ece59fa805dc56b5215027e296cc12ad32

    • Size

      854KB

    • MD5

      df70e76f6c2ffbf6e5957a38f8a37a5f

    • SHA1

      e2fe2ba4175e5685c8a4c22f38acc875eec771a2

    • SHA256

      bb8395e0d203dc6529519036ed32b8ece59fa805dc56b5215027e296cc12ad32

    • SHA512

      acc47dd3ff283a2763f7092a0bc1c6f41fc458c935b7d5056f75e038d579de11c86afc63921b9642a4a93ce6ce5cdd845db295c7de85d38a34749cc813f41dbf

    • SSDEEP

      24576:GytbDTvY6siRfE5E/cPKrOq+dF6w96YLU:VtbDkORMi/cirp01tL

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks