General

  • Target

    458e3ba35592fec00a34b969c8ac4421c0ffa757db0c4cf20ff7b068e5e28ede

  • Size

    1.0MB

  • Sample

    230413-b59t3age85

  • MD5

    0b52a087b52469dc0199b8286f475d9c

  • SHA1

    371573a87d194e18ee809bf19a88b969084ec810

  • SHA256

    458e3ba35592fec00a34b969c8ac4421c0ffa757db0c4cf20ff7b068e5e28ede

  • SHA512

    159fa2bb0f1bc3207e6073e96ce27c0e441cbe6b45563ab5485d1130b50650a9dd0c63cfe414372c3edf4a9174e4be31ebd130006a8f24c121d168d8562ff63a

  • SSDEEP

    24576:/yOUiCponONCV1x4EoPftFHLjm8g9FPix6sHJH:K+konOGrml28eKv

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Targets

    • Target

      458e3ba35592fec00a34b969c8ac4421c0ffa757db0c4cf20ff7b068e5e28ede

    • Size

      1.0MB

    • MD5

      0b52a087b52469dc0199b8286f475d9c

    • SHA1

      371573a87d194e18ee809bf19a88b969084ec810

    • SHA256

      458e3ba35592fec00a34b969c8ac4421c0ffa757db0c4cf20ff7b068e5e28ede

    • SHA512

      159fa2bb0f1bc3207e6073e96ce27c0e441cbe6b45563ab5485d1130b50650a9dd0c63cfe414372c3edf4a9174e4be31ebd130006a8f24c121d168d8562ff63a

    • SSDEEP

      24576:/yOUiCponONCV1x4EoPftFHLjm8g9FPix6sHJH:K+konOGrml28eKv

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks