General

  • Target

    53c31ecab27ae441da7d48c6692ef59669f14e1f8d75b62589211c8f9d2981d8

  • Size

    1.0MB

  • Sample

    230414-e59e3sgb47

  • MD5

    24153aa92d4ae8981631b55dc75081c2

  • SHA1

    4cf4a6f070202d2e1824c756239731195585facd

  • SHA256

    53c31ecab27ae441da7d48c6692ef59669f14e1f8d75b62589211c8f9d2981d8

  • SHA512

    775522dbacbdc8771bd434cd8f67951e664a37ba83863107eea82fc861c821935e3e2f80a63ebe823f99d7238dcfd9ad4550b73333a698c81851908bbc0ffd23

  • SSDEEP

    24576:EyP2PZt6BVaz1c+yHc1SSJjRgoKyKNtx+Mf8Qo2oZy8lhH5ZY:TPsCBgsc1SGdgoq+MxToZJhH5Z

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      53c31ecab27ae441da7d48c6692ef59669f14e1f8d75b62589211c8f9d2981d8

    • Size

      1.0MB

    • MD5

      24153aa92d4ae8981631b55dc75081c2

    • SHA1

      4cf4a6f070202d2e1824c756239731195585facd

    • SHA256

      53c31ecab27ae441da7d48c6692ef59669f14e1f8d75b62589211c8f9d2981d8

    • SHA512

      775522dbacbdc8771bd434cd8f67951e664a37ba83863107eea82fc861c821935e3e2f80a63ebe823f99d7238dcfd9ad4550b73333a698c81851908bbc0ffd23

    • SSDEEP

      24576:EyP2PZt6BVaz1c+yHc1SSJjRgoKyKNtx+Mf8Qo2oZy8lhH5ZY:TPsCBgsc1SGdgoq+MxToZJhH5Z

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks