General

  • Target

    c30e1bde7dff42a537157ce6794e11320d688dd55dbe2e726e843401425461b2

  • Size

    1.0MB

  • Sample

    230414-g9sn8sab3w

  • MD5

    172fd98bea013780e10df694a7c24536

  • SHA1

    1e2e3b8110b1c8329e37bc42e86dd72a99070c36

  • SHA256

    c30e1bde7dff42a537157ce6794e11320d688dd55dbe2e726e843401425461b2

  • SHA512

    b48f6f6a9c1b5d9942ae18164d210918c5a00b323e26a31e4b51b77e6632c541dbbf82584c6951612f42bfbbefeaefb996290536186364d579384babddb1eda2

  • SSDEEP

    24576:ByX7Rh7Zbb9fdA9XPCUVsnFLs3w56X+9fARfLxFIiaZvxY:0X37Zf9FCCUIsgIzjbK

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      c30e1bde7dff42a537157ce6794e11320d688dd55dbe2e726e843401425461b2

    • Size

      1.0MB

    • MD5

      172fd98bea013780e10df694a7c24536

    • SHA1

      1e2e3b8110b1c8329e37bc42e86dd72a99070c36

    • SHA256

      c30e1bde7dff42a537157ce6794e11320d688dd55dbe2e726e843401425461b2

    • SHA512

      b48f6f6a9c1b5d9942ae18164d210918c5a00b323e26a31e4b51b77e6632c541dbbf82584c6951612f42bfbbefeaefb996290536186364d579384babddb1eda2

    • SSDEEP

      24576:ByX7Rh7Zbb9fdA9XPCUVsnFLs3w56X+9fARfLxFIiaZvxY:0X37Zf9FCCUIsgIzjbK

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks