General

  • Target

    da411cad12d2fb5ec1249fa7eb0a0e4556b0023f12a32317314bd174b9fee40d

  • Size

    1.4MB

  • Sample

    230414-akm9wsfb42

  • MD5

    a9eff46379de0fc22d1901ef14376992

  • SHA1

    6233789435bf2cb88868449be3189dd1d157d1ec

  • SHA256

    da411cad12d2fb5ec1249fa7eb0a0e4556b0023f12a32317314bd174b9fee40d

  • SHA512

    861256a89327dac826041af743e9c20ba6a3bd95289799516765e7c69a869e20c1df70cdbac3fdacb327c2bf3d9aa9f4e4dd44f1573b84a89c829596ef296094

  • SSDEEP

    24576:pyXqG95z9nxJaf0QtlOqxGKM3XsYsw9jF/bVN49VB9g9aSCwx0jHtmB3vIv:cXqG9d9nxE5lOqxgswdF/xGb/g9RCw

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Extracted

Family

redline

Botnet

masi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6e26457e57602c4cf35356c36d8dd8e8

Targets

    • Target

      da411cad12d2fb5ec1249fa7eb0a0e4556b0023f12a32317314bd174b9fee40d

    • Size

      1.4MB

    • MD5

      a9eff46379de0fc22d1901ef14376992

    • SHA1

      6233789435bf2cb88868449be3189dd1d157d1ec

    • SHA256

      da411cad12d2fb5ec1249fa7eb0a0e4556b0023f12a32317314bd174b9fee40d

    • SHA512

      861256a89327dac826041af743e9c20ba6a3bd95289799516765e7c69a869e20c1df70cdbac3fdacb327c2bf3d9aa9f4e4dd44f1573b84a89c829596ef296094

    • SSDEEP

      24576:pyXqG95z9nxJaf0QtlOqxGKM3XsYsw9jF/bVN49VB9g9aSCwx0jHtmB3vIv:cXqG9d9nxE5lOqxgswdF/xGb/g9RCw

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks