General

  • Target

    2f6836f1e120f83be6a675d0474a8d1d26dbc5783ee41fbfd4748f8a27cd2e6a

  • Size

    1.2MB

  • Sample

    230414-h8pfvsgh58

  • MD5

    6793b8acf02a7e9c20a2d7600c06a23d

  • SHA1

    f22097eab1173582132722c133bdb5e8c419926a

  • SHA256

    2f6836f1e120f83be6a675d0474a8d1d26dbc5783ee41fbfd4748f8a27cd2e6a

  • SHA512

    af549450f50cdf2dade516d90369ca515ca1ee5107a47ab51abe8d209058e7985fbf0cef16c1830215b0130e8295949bcce6473c1c03ec704c86b0c2b1129e62

  • SSDEEP

    24576:9yH+w7kEj7y6Z+Sw2suOgU0LVRqvLCCNlrAd/Ill0Ti36tU3DE2GI:YH+u9vJ22IT0L0CieM0n2G

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      2f6836f1e120f83be6a675d0474a8d1d26dbc5783ee41fbfd4748f8a27cd2e6a

    • Size

      1.2MB

    • MD5

      6793b8acf02a7e9c20a2d7600c06a23d

    • SHA1

      f22097eab1173582132722c133bdb5e8c419926a

    • SHA256

      2f6836f1e120f83be6a675d0474a8d1d26dbc5783ee41fbfd4748f8a27cd2e6a

    • SHA512

      af549450f50cdf2dade516d90369ca515ca1ee5107a47ab51abe8d209058e7985fbf0cef16c1830215b0130e8295949bcce6473c1c03ec704c86b0c2b1129e62

    • SSDEEP

      24576:9yH+w7kEj7y6Z+Sw2suOgU0LVRqvLCCNlrAd/Ill0Ti36tU3DE2GI:YH+u9vJ22IT0L0CieM0n2G

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks