General

  • Target

    2cd570f5f91930f8afe5f08a13a7c0f5aa4fc5ced864f7c43ab0780af4ab5336

  • Size

    962KB

  • Sample

    230413-1c8tqsed74

  • MD5

    a24818dee72ddda78159f248d65b4ad1

  • SHA1

    873839324b61eadc6f70d9527687750a6603721e

  • SHA256

    2cd570f5f91930f8afe5f08a13a7c0f5aa4fc5ced864f7c43ab0780af4ab5336

  • SHA512

    497a09d898db19fd46d377aa5d9aa5875004e9b237ef9363de681e860a3eb8e203d0d7dc381d92a38ff90d61cdb40bf2159ef043ca1b6f06b9a2c4b88f2fb79f

  • SSDEEP

    12288:NMrVy90eBxj9eGu6JgrWei+SUdCQee/CdBfS7qoZvcL1Fj4HGd1uNdI/61VGwS40:kyHBx54WCSCCQe8CWrUjJd1uXl4w7g

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      2cd570f5f91930f8afe5f08a13a7c0f5aa4fc5ced864f7c43ab0780af4ab5336

    • Size

      962KB

    • MD5

      a24818dee72ddda78159f248d65b4ad1

    • SHA1

      873839324b61eadc6f70d9527687750a6603721e

    • SHA256

      2cd570f5f91930f8afe5f08a13a7c0f5aa4fc5ced864f7c43ab0780af4ab5336

    • SHA512

      497a09d898db19fd46d377aa5d9aa5875004e9b237ef9363de681e860a3eb8e203d0d7dc381d92a38ff90d61cdb40bf2159ef043ca1b6f06b9a2c4b88f2fb79f

    • SSDEEP

      12288:NMrVy90eBxj9eGu6JgrWei+SUdCQee/CdBfS7qoZvcL1Fj4HGd1uNdI/61VGwS40:kyHBx54WCSCCQe8CWrUjJd1uXl4w7g

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks