General

  • Target

    bc038b6f316d86f0e27c3b55bb7ffc9889bafaa89a81db6b0d7e9651b3ca76b6

  • Size

    1.0MB

  • Sample

    230414-fsrj6shf9s

  • MD5

    600cb5ffa22372a4fa19cf811a92e65c

  • SHA1

    7328fd3228378508034fcd2b86887ac70abd2ec0

  • SHA256

    bc038b6f316d86f0e27c3b55bb7ffc9889bafaa89a81db6b0d7e9651b3ca76b6

  • SHA512

    bbcb87d01820733a13e0df6aa21856cbfe2831ddda8dc7ba5724adacb03cf5310217e4c5c644257aa001454ab3ec225afb28fda56f90167e3b6c7fe6487a9d0f

  • SSDEEP

    24576:lydEM7fZiC5iMggST//WGodbSXJjRdb2LEBBQanBwQeY:AdEsfZrd9ndbS5ddb2LEvQanVe

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      bc038b6f316d86f0e27c3b55bb7ffc9889bafaa89a81db6b0d7e9651b3ca76b6

    • Size

      1.0MB

    • MD5

      600cb5ffa22372a4fa19cf811a92e65c

    • SHA1

      7328fd3228378508034fcd2b86887ac70abd2ec0

    • SHA256

      bc038b6f316d86f0e27c3b55bb7ffc9889bafaa89a81db6b0d7e9651b3ca76b6

    • SHA512

      bbcb87d01820733a13e0df6aa21856cbfe2831ddda8dc7ba5724adacb03cf5310217e4c5c644257aa001454ab3ec225afb28fda56f90167e3b6c7fe6487a9d0f

    • SSDEEP

      24576:lydEM7fZiC5iMggST//WGodbSXJjRdb2LEBBQanBwQeY:AdEsfZrd9ndbS5ddb2LEvQanVe

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks