General

  • Target

    09288246d63a8f7c7758d52ca780d371e61e64c6755cc6b238e94a55a64901d3

  • Size

    1.2MB

  • Sample

    230414-e78asshf21

  • MD5

    bb061148f7b31a85217af1f827c3cf25

  • SHA1

    acbed308a31ad466a03693cb8a27fa4b8f223f81

  • SHA256

    09288246d63a8f7c7758d52ca780d371e61e64c6755cc6b238e94a55a64901d3

  • SHA512

    0f68e485af7630e7b68032dc6a6e3b411d8fe34eae2b25fd6ec8d0d96069b44ddffee884eaf384edc9d0021bab579f44caca7f0b53133f794d53ebe509353fb9

  • SSDEEP

    24576:IyTaPxjJB6IAEOevMGHETAYC3jfrSZJ5RWtACWb0sfb+4ns:PP58ZfTfrSfDWtNWb0sfbn

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      09288246d63a8f7c7758d52ca780d371e61e64c6755cc6b238e94a55a64901d3

    • Size

      1.2MB

    • MD5

      bb061148f7b31a85217af1f827c3cf25

    • SHA1

      acbed308a31ad466a03693cb8a27fa4b8f223f81

    • SHA256

      09288246d63a8f7c7758d52ca780d371e61e64c6755cc6b238e94a55a64901d3

    • SHA512

      0f68e485af7630e7b68032dc6a6e3b411d8fe34eae2b25fd6ec8d0d96069b44ddffee884eaf384edc9d0021bab579f44caca7f0b53133f794d53ebe509353fb9

    • SSDEEP

      24576:IyTaPxjJB6IAEOevMGHETAYC3jfrSZJ5RWtACWb0sfb+4ns:PP58ZfTfrSfDWtNWb0sfbn

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks