General

  • Target

    92d60f38f139317e752d814e4d09a553326fd95ae0056b0d5740a97258b61bc2

  • Size

    1.4MB

  • Sample

    230414-ck8xpsfe74

  • MD5

    6e169b3bb302baab9d5f777736c35614

  • SHA1

    d8399f1767f00ea63830bee7e9be38d6c1eaae0e

  • SHA256

    92d60f38f139317e752d814e4d09a553326fd95ae0056b0d5740a97258b61bc2

  • SHA512

    55d47dce767ac1282ed12e77e7615b84c6a5614b54f9aa72893d5071dd5f489b0a7d8142bab7de965204bc5aa1ab1a90da862e4932bd3e1defac96eb770bc968

  • SSDEEP

    24576:VyTgVDZmfGaLx8LJ2DLeHKatUJwzIbghJ3AaVHhVdPvrf05RlvgkXP:wNwJ2neHKa+JwzQCwsnNQhX

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Extracted

Family

redline

Botnet

masi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6e26457e57602c4cf35356c36d8dd8e8

Targets

    • Target

      92d60f38f139317e752d814e4d09a553326fd95ae0056b0d5740a97258b61bc2

    • Size

      1.4MB

    • MD5

      6e169b3bb302baab9d5f777736c35614

    • SHA1

      d8399f1767f00ea63830bee7e9be38d6c1eaae0e

    • SHA256

      92d60f38f139317e752d814e4d09a553326fd95ae0056b0d5740a97258b61bc2

    • SHA512

      55d47dce767ac1282ed12e77e7615b84c6a5614b54f9aa72893d5071dd5f489b0a7d8142bab7de965204bc5aa1ab1a90da862e4932bd3e1defac96eb770bc968

    • SSDEEP

      24576:VyTgVDZmfGaLx8LJ2DLeHKatUJwzIbghJ3AaVHhVdPvrf05RlvgkXP:wNwJ2neHKa+JwzQCwsnNQhX

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks