General

  • Target

    a8edd42ca27e45b8831c0bbae9f4b7a2.bin

  • Size

    1.1MB

  • Sample

    230413-b5sksage83

  • MD5

    cfed9b2fc2cb562ca3a160d5434b7484

  • SHA1

    1abca26c9eec775d011e4bcf15529d7e81c5ed97

  • SHA256

    b2406190573157317267986231796a271a961d88f93c598f8f559fd29254c63c

  • SHA512

    4f51e12b5d90a8b74435e73834f81d4f898c6a9c35bb600a8d7716d0506634ca1c086365add1821496c9e0c3f469bdc3e6f67bbc3fec24457f20cea86381f9b2

  • SSDEEP

    24576:kvB4T8UUzJOINrLBkSIqSNwYRfSiUNqKsw:kp4LyJOIwPJStsw

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      7df83d09198b8535e4ea95c862283aac5b5e26c89173f86666b7b3b84024fd2a.exe

    • Size

      1.1MB

    • MD5

      a8edd42ca27e45b8831c0bbae9f4b7a2

    • SHA1

      5cf24fc2d3f935c0e8929322ee783c5b28956bf6

    • SHA256

      7df83d09198b8535e4ea95c862283aac5b5e26c89173f86666b7b3b84024fd2a

    • SHA512

      6837b3ca2e2791c9f8e69d51a78a2433e026b9a3c4d4644826c8b65ddeca388b5e326a49557b83b7ea61ab809827ce9c627bf746e3ac4f9d8c67f68b9d7baa82

    • SSDEEP

      24576:3yYLhF+X2wbzRomS8VnvQ/CpBk/OobDLRLYxe9Yw0s2oJ:CY1F+VSmvA4BNobDhYxCJ2

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks