General

  • Target

    f6b64dbefebe080c5e9f442f4a999f663fe112cd717d32528f4a1b79c9c8e8e9

  • Size

    1.1MB

  • Sample

    230412-ctf82sha62

  • MD5

    e069226e88a91b79de7a8bb6b7cbce8f

  • SHA1

    a7a40ed35e7eedb8e4ee7388c1f3c4834b6d9995

  • SHA256

    f6b64dbefebe080c5e9f442f4a999f663fe112cd717d32528f4a1b79c9c8e8e9

  • SHA512

    db61662b1b4dbc7e3fdb87aaafac932d00cfa4a049148621fc9b1cc9028419fc8c373d159feeafbd28e1c9f2e390e47a94ffb061ef5955d9373f6858920594cb

  • SSDEEP

    24576:5yjTvEkjhnW3u8QuEsk3HIRBlFwC0yYcKyWP99I:sjT7Vf8EoTTzULF

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      f6b64dbefebe080c5e9f442f4a999f663fe112cd717d32528f4a1b79c9c8e8e9

    • Size

      1.1MB

    • MD5

      e069226e88a91b79de7a8bb6b7cbce8f

    • SHA1

      a7a40ed35e7eedb8e4ee7388c1f3c4834b6d9995

    • SHA256

      f6b64dbefebe080c5e9f442f4a999f663fe112cd717d32528f4a1b79c9c8e8e9

    • SHA512

      db61662b1b4dbc7e3fdb87aaafac932d00cfa4a049148621fc9b1cc9028419fc8c373d159feeafbd28e1c9f2e390e47a94ffb061ef5955d9373f6858920594cb

    • SSDEEP

      24576:5yjTvEkjhnW3u8QuEsk3HIRBlFwC0yYcKyWP99I:sjT7Vf8EoTTzULF

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks