General

  • Target

    c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67

  • Size

    1.2MB

  • Sample

    230414-e2kbsahe8y

  • MD5

    86644f8bd03e3c88a075555bd0a4f7e2

  • SHA1

    e793ad38bb5aeaff867cc44fb7ecfd00b10d39b6

  • SHA256

    c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67

  • SHA512

    91a1df6af342996d48fe3937771634b42a50ffca02f72194969198f69b4adbd886cc2d750ee72a8134c7d92b25813c8324d7ebae2877ad117721e3b0f3332ec6

  • SSDEEP

    24576:Oy1hRJytmWfT6yaifJflFW+VTgL6owY9YmFnSZJFZA8SVwPzBfvVE:d1hRJImYTUcRmqTg1dFnSfTtDfvV

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67

    • Size

      1.2MB

    • MD5

      86644f8bd03e3c88a075555bd0a4f7e2

    • SHA1

      e793ad38bb5aeaff867cc44fb7ecfd00b10d39b6

    • SHA256

      c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67

    • SHA512

      91a1df6af342996d48fe3937771634b42a50ffca02f72194969198f69b4adbd886cc2d750ee72a8134c7d92b25813c8324d7ebae2877ad117721e3b0f3332ec6

    • SSDEEP

      24576:Oy1hRJytmWfT6yaifJflFW+VTgL6owY9YmFnSZJFZA8SVwPzBfvVE:d1hRJImYTUcRmqTg1dFnSfTtDfvV

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks