General

  • Target

    97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28

  • Size

    1.2MB

  • Sample

    230414-elfcwshe3s

  • MD5

    7a506cd02fa4f8483409de2ee64d038d

  • SHA1

    268f1828021a6e7f6dff7bcf4753f9993d1a924c

  • SHA256

    97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28

  • SHA512

    331107d045b59dc8c7814212c25b157e61840df2a3b9bdc5e8f30b2ee1ff5e11a48c44a49e06d78b4c20ebf4085d5b2250155ca2c7bc0e2a59a53df080d4851f

  • SSDEEP

    24576:wyolMQ26PausL6BIAWDzwKL1fR5YLe0eFSZJCPFQCmE3Dfinm5mrv3:3olRiuY6BKwEiZeFSfIFJWnmwrv

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28

    • Size

      1.2MB

    • MD5

      7a506cd02fa4f8483409de2ee64d038d

    • SHA1

      268f1828021a6e7f6dff7bcf4753f9993d1a924c

    • SHA256

      97c1d32857dac37dc884801d79b1f9546962978206b7b394310868c1189e0e28

    • SHA512

      331107d045b59dc8c7814212c25b157e61840df2a3b9bdc5e8f30b2ee1ff5e11a48c44a49e06d78b4c20ebf4085d5b2250155ca2c7bc0e2a59a53df080d4851f

    • SSDEEP

      24576:wyolMQ26PausL6BIAWDzwKL1fR5YLe0eFSZJCPFQCmE3Dfinm5mrv3:3olRiuY6BKwEiZeFSfIFJWnmwrv

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks