General

  • Target

    46873ef4b06491c720dff743eb6e91ced293ca2d02286062c873d42c47e5abf8

  • Size

    940KB

  • Sample

    230413-ka134sac62

  • MD5

    91c2f4c5a8c618a1328faff4ed90d2f1

  • SHA1

    bacad11a40e7dcad6e8ac34f075ad20d5e7c8f48

  • SHA256

    46873ef4b06491c720dff743eb6e91ced293ca2d02286062c873d42c47e5abf8

  • SHA512

    be481df5a444697025c6f92b40a81ffc626f289ae959e4694d2dcd10cd03986af18669630a91ac4f571ff557f94db6279cc29525310dafde5ab54864a1c5d4c2

  • SSDEEP

    24576:pyyRcldEbF9MEZY7Z09t7IQ6WNgZPKPG1KV:cyRcUb/FZ9r8PKPG

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Targets

    • Target

      46873ef4b06491c720dff743eb6e91ced293ca2d02286062c873d42c47e5abf8

    • Size

      940KB

    • MD5

      91c2f4c5a8c618a1328faff4ed90d2f1

    • SHA1

      bacad11a40e7dcad6e8ac34f075ad20d5e7c8f48

    • SHA256

      46873ef4b06491c720dff743eb6e91ced293ca2d02286062c873d42c47e5abf8

    • SHA512

      be481df5a444697025c6f92b40a81ffc626f289ae959e4694d2dcd10cd03986af18669630a91ac4f571ff557f94db6279cc29525310dafde5ab54864a1c5d4c2

    • SSDEEP

      24576:pyyRcldEbF9MEZY7Z09t7IQ6WNgZPKPG1KV:cyRcUb/FZ9r8PKPG

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks