General

  • Target

    c6c607170e8e30ac04fbe76569ccc8f136db67d05e570ecb59b5f1590f11c8ec

  • Size

    940KB

  • Sample

    230413-fl4wxshe67

  • MD5

    1d695d4e3c2e6a374126f09d92473ef0

  • SHA1

    3a9183aa37702d308f1030bed6aba9cdfd49cd27

  • SHA256

    c6c607170e8e30ac04fbe76569ccc8f136db67d05e570ecb59b5f1590f11c8ec

  • SHA512

    e33ae12f28010db0b9d6a73b7f07b13bd1011ad29f936e85fab1eb422a5ed69860b4ec57b1f81111e5b946c7d98af21d362b85d365ee472e2d0b23c4fd2d49f6

  • SSDEEP

    12288:TMrHy90jAzuuwXB05S8NfIeC2kCNu9kol5qHYRdXB+g4w4Qc46H/+qhIjz5WZe1M:Uyo3X6FtIea/97l5q4LXgzQP6HG4Ob2

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Targets

    • Target

      c6c607170e8e30ac04fbe76569ccc8f136db67d05e570ecb59b5f1590f11c8ec

    • Size

      940KB

    • MD5

      1d695d4e3c2e6a374126f09d92473ef0

    • SHA1

      3a9183aa37702d308f1030bed6aba9cdfd49cd27

    • SHA256

      c6c607170e8e30ac04fbe76569ccc8f136db67d05e570ecb59b5f1590f11c8ec

    • SHA512

      e33ae12f28010db0b9d6a73b7f07b13bd1011ad29f936e85fab1eb422a5ed69860b4ec57b1f81111e5b946c7d98af21d362b85d365ee472e2d0b23c4fd2d49f6

    • SSDEEP

      12288:TMrHy90jAzuuwXB05S8NfIeC2kCNu9kol5qHYRdXB+g4w4Qc46H/+qhIjz5WZe1M:Uyo3X6FtIea/97l5q4LXgzQP6HG4Ob2

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks