General

  • Target

    f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2

  • Size

    1.2MB

  • Sample

    230414-fd47qahf4x

  • MD5

    26a98be31b8cc17dfea69c76bbf69600

  • SHA1

    5ea70e9881df2a92da9a243e0501a898e1c3b933

  • SHA256

    f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2

  • SHA512

    51545a73a96893ecb2356ef186e2394d13cc1a4703ad5bc56c6d2ca37adbfeabdd0ffa7d23f99b1171cf66d266ae3834f2372f670a22f9ffcb82ba1c96dac3f8

  • SSDEEP

    24576:jyGicM/PDxbaxJoddE8d3o0VD2j864YNe9u2SZJzR+iE/xQcGdLfVxQILBF:2bBaQddR9/tk5Eu2Sft+iE/OXdrPT

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2

    • Size

      1.2MB

    • MD5

      26a98be31b8cc17dfea69c76bbf69600

    • SHA1

      5ea70e9881df2a92da9a243e0501a898e1c3b933

    • SHA256

      f7cb9a802af9ff01b4d92caf1ae08aaa2fefc4b1695c6667ef62161b6354ded2

    • SHA512

      51545a73a96893ecb2356ef186e2394d13cc1a4703ad5bc56c6d2ca37adbfeabdd0ffa7d23f99b1171cf66d266ae3834f2372f670a22f9ffcb82ba1c96dac3f8

    • SSDEEP

      24576:jyGicM/PDxbaxJoddE8d3o0VD2j864YNe9u2SZJzR+iE/xQcGdLfVxQILBF:2bBaQddR9/tk5Eu2Sft+iE/OXdrPT

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks