General

  • Target

    e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf

  • Size

    1.0MB

  • Sample

    230414-eash3shd7y

  • MD5

    a2a426d22a2bf231dcc248b52c49efea

  • SHA1

    fda20206948431e1f369ba08d761883844187a10

  • SHA256

    e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf

  • SHA512

    bba44425ca474edc4754066f979ea80a0ea722159e54613d14f5f2a8bb61ef43b69f8a467e22c9b035fea77fcaaf2ff9b5f84858ae5cce4c988aa8f5d541e504

  • SSDEEP

    24576:Ey/x4aK5bPjowa/Z8JFK1FQDr6fpfWc+MA4Eq8Ora9D1L:T/1K9Pcl/ZpaD+fUcNaV

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf

    • Size

      1.0MB

    • MD5

      a2a426d22a2bf231dcc248b52c49efea

    • SHA1

      fda20206948431e1f369ba08d761883844187a10

    • SHA256

      e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf

    • SHA512

      bba44425ca474edc4754066f979ea80a0ea722159e54613d14f5f2a8bb61ef43b69f8a467e22c9b035fea77fcaaf2ff9b5f84858ae5cce4c988aa8f5d541e504

    • SSDEEP

      24576:Ey/x4aK5bPjowa/Z8JFK1FQDr6fpfWc+MA4Eq8Ora9D1L:T/1K9Pcl/ZpaD+fUcNaV

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks