General

  • Target

    97100882e74c8881b69fe82e4db111dc874fb7d28cb184020cef1f7e6f4e535f

  • Size

    896KB

  • Sample

    230412-pzphtscc89

  • MD5

    9cf55a68eef77b1f1ed2e1755c2558c3

  • SHA1

    5103b16f9fe832a060a43374831dc5bb7864513f

  • SHA256

    97100882e74c8881b69fe82e4db111dc874fb7d28cb184020cef1f7e6f4e535f

  • SHA512

    8e684accb5af1511e37960d522996a4780b629ceeb6dcf8a06f7cede7b320570a41c7233b5e6cf04a105484f070e28693950308598c3974b750699f3ca096f2a

  • SSDEEP

    12288:NMrDy907jFGXbvJ1NcFeklsqM5yQslY5JhjmwfSfuB053VX6baw5fQm/MR:2ytOFvl8jSY3swKfuA3VgN1m

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Targets

    • Target

      97100882e74c8881b69fe82e4db111dc874fb7d28cb184020cef1f7e6f4e535f

    • Size

      896KB

    • MD5

      9cf55a68eef77b1f1ed2e1755c2558c3

    • SHA1

      5103b16f9fe832a060a43374831dc5bb7864513f

    • SHA256

      97100882e74c8881b69fe82e4db111dc874fb7d28cb184020cef1f7e6f4e535f

    • SHA512

      8e684accb5af1511e37960d522996a4780b629ceeb6dcf8a06f7cede7b320570a41c7233b5e6cf04a105484f070e28693950308598c3974b750699f3ca096f2a

    • SSDEEP

      12288:NMrDy907jFGXbvJ1NcFeklsqM5yQslY5JhjmwfSfuB053VX6baw5fQm/MR:2ytOFvl8jSY3swKfuA3VgN1m

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks