General

  • Target

    318422fe3d7a7d743efcdf9ef5c2d73f399397230e29b2a505c8d03b8655082c

  • Size

    991KB

  • Sample

    230411-zbd3asfc32

  • MD5

    06c45ddbd9c514fac0d6eb78f0d3f160

  • SHA1

    1249df8f5687fba2a2ea03782564e62d2d9c1fbc

  • SHA256

    318422fe3d7a7d743efcdf9ef5c2d73f399397230e29b2a505c8d03b8655082c

  • SHA512

    0e9f056c874607897998cf31beadd649932ce2c24ba1bc1fe8b7279ae56c06e89c89b919b727e23a3f4f11b33cd550f545355be5f6e935fbb970691c30983aa7

  • SSDEEP

    24576:byFvLS1Dpj37RrTa/HKNcVmcL2Xtb+iWwtiGltQaT:OtSRNZbNcocsf3tPlt

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Targets

    • Target

      318422fe3d7a7d743efcdf9ef5c2d73f399397230e29b2a505c8d03b8655082c

    • Size

      991KB

    • MD5

      06c45ddbd9c514fac0d6eb78f0d3f160

    • SHA1

      1249df8f5687fba2a2ea03782564e62d2d9c1fbc

    • SHA256

      318422fe3d7a7d743efcdf9ef5c2d73f399397230e29b2a505c8d03b8655082c

    • SHA512

      0e9f056c874607897998cf31beadd649932ce2c24ba1bc1fe8b7279ae56c06e89c89b919b727e23a3f4f11b33cd550f545355be5f6e935fbb970691c30983aa7

    • SSDEEP

      24576:byFvLS1Dpj37RrTa/HKNcVmcL2Xtb+iWwtiGltQaT:OtSRNZbNcocsf3tPlt

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks