General

  • Target

    c6a58c22e3ebedba72465d86984f2f2145565d6e7370737a89f7dad22080bd3e

  • Size

    1.0MB

  • Sample

    230412-s2vdmsdb73

  • MD5

    df7d285c6bbe7a62ed61056033392a16

  • SHA1

    56acafa1bc8803fac8319d96adfa13ab2fa27c99

  • SHA256

    c6a58c22e3ebedba72465d86984f2f2145565d6e7370737a89f7dad22080bd3e

  • SHA512

    eb2b27e3425739fc25322e8036b38bbfb0fc030619ec854d109c6c1d4bc7a63fed782ab3eae9fd3ea000b55ddaeb68910976daa70678c76a92b621c1044e4a12

  • SSDEEP

    24576:2ylH0RyQa0VLKNuWgAkEuJkCzgUJHIsjkGrN8ziAonP:FlHf0VeNuHfrkGoWkGr2O9

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      c6a58c22e3ebedba72465d86984f2f2145565d6e7370737a89f7dad22080bd3e

    • Size

      1.0MB

    • MD5

      df7d285c6bbe7a62ed61056033392a16

    • SHA1

      56acafa1bc8803fac8319d96adfa13ab2fa27c99

    • SHA256

      c6a58c22e3ebedba72465d86984f2f2145565d6e7370737a89f7dad22080bd3e

    • SHA512

      eb2b27e3425739fc25322e8036b38bbfb0fc030619ec854d109c6c1d4bc7a63fed782ab3eae9fd3ea000b55ddaeb68910976daa70678c76a92b621c1044e4a12

    • SSDEEP

      24576:2ylH0RyQa0VLKNuWgAkEuJkCzgUJHIsjkGrN8ziAonP:FlHf0VeNuHfrkGoWkGr2O9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks