General

  • Target

    b2aae537182a8e78e5f1440890b769e59b82978026b3675fdedc43c5063db347

  • Size

    1.1MB

  • Sample

    230412-fanesshh42

  • MD5

    181a02321038bd5bff3fbbb79eacd35a

  • SHA1

    e9e3cea217669d29b0f50108d39af2f44ffc9293

  • SHA256

    b2aae537182a8e78e5f1440890b769e59b82978026b3675fdedc43c5063db347

  • SHA512

    3c8a4215819f7964e538bf171da12e8a176d646b445643f4d52e47a4eeb9218e0bb714cd6a60e0c0adc3645b3d82ab00623bafb3c824a9aab4630ca6260b2d5d

  • SSDEEP

    24576:cy1nsGxU2YjR7QSfD+DWyOMCnlRVuSndCQr:LtLxU3jRoW3lrVuSnd

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      b2aae537182a8e78e5f1440890b769e59b82978026b3675fdedc43c5063db347

    • Size

      1.1MB

    • MD5

      181a02321038bd5bff3fbbb79eacd35a

    • SHA1

      e9e3cea217669d29b0f50108d39af2f44ffc9293

    • SHA256

      b2aae537182a8e78e5f1440890b769e59b82978026b3675fdedc43c5063db347

    • SHA512

      3c8a4215819f7964e538bf171da12e8a176d646b445643f4d52e47a4eeb9218e0bb714cd6a60e0c0adc3645b3d82ab00623bafb3c824a9aab4630ca6260b2d5d

    • SSDEEP

      24576:cy1nsGxU2YjR7QSfD+DWyOMCnlRVuSndCQr:LtLxU3jRoW3lrVuSnd

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks