General

  • Target

    bf3199c23319fcff1ffef31e0a7930a41f5f03d5503d5638c754e4c7530d3d03

  • Size

    1.5MB

  • Sample

    230412-xve3lafg91

  • MD5

    9c308f06c92bd11eaddfc13c8b4f2ee8

  • SHA1

    1fd327d6ab22a1e5f4189c9820e2d3a0f5404b52

  • SHA256

    bf3199c23319fcff1ffef31e0a7930a41f5f03d5503d5638c754e4c7530d3d03

  • SHA512

    60e47929cb94c8abe6a6385dec4f10a6ec23f6493f80fa40640b82bee0989ae06ade6798967606fba1a841c0dc22709102d8fd75f9c8977db8ab016ec823cca7

  • SSDEEP

    24576:uyOx4NU38zFjZfokAm5a2YtpISc5epZzTLlE475Dv9Pn65RLGmVposkr26QiMRjN:9OOG38zFpj7s2YtpKeHT75Dly5dGmosl

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      bf3199c23319fcff1ffef31e0a7930a41f5f03d5503d5638c754e4c7530d3d03

    • Size

      1.5MB

    • MD5

      9c308f06c92bd11eaddfc13c8b4f2ee8

    • SHA1

      1fd327d6ab22a1e5f4189c9820e2d3a0f5404b52

    • SHA256

      bf3199c23319fcff1ffef31e0a7930a41f5f03d5503d5638c754e4c7530d3d03

    • SHA512

      60e47929cb94c8abe6a6385dec4f10a6ec23f6493f80fa40640b82bee0989ae06ade6798967606fba1a841c0dc22709102d8fd75f9c8977db8ab016ec823cca7

    • SSDEEP

      24576:uyOx4NU38zFjZfokAm5a2YtpISc5epZzTLlE475Dv9Pn65RLGmVposkr26QiMRjN:9OOG38zFpj7s2YtpKeHT75Dly5dGmosl

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks