General

  • Target

    f763c67e7f6d77375cb64235375cef496ffe8234c8fe6e0a526d20d80591b441

  • Size

    1.0MB

  • Sample

    230414-hfy5laab5v

  • MD5

    6d0edc30b7c25a93ccabfda8186e68b4

  • SHA1

    12f02d4b2ba1794564d2343b64c27fd9ec7f71a2

  • SHA256

    f763c67e7f6d77375cb64235375cef496ffe8234c8fe6e0a526d20d80591b441

  • SHA512

    8ac5d6876add97f2b26b7ef5bca75a5b787df5cbb3786ce881088a1876a911a5c7053e7d3968f587e313c17a4f31be8dfc326a2dc945ed866e7f1f62a35f072c

  • SSDEEP

    24576:CyoUOWgh6k0MJgi20MWNMjV9M0LwrYFL7U6RWS0bmmP6xGQM6:po1Wvk0+novw0FLQgWS0uxS

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      f763c67e7f6d77375cb64235375cef496ffe8234c8fe6e0a526d20d80591b441

    • Size

      1.0MB

    • MD5

      6d0edc30b7c25a93ccabfda8186e68b4

    • SHA1

      12f02d4b2ba1794564d2343b64c27fd9ec7f71a2

    • SHA256

      f763c67e7f6d77375cb64235375cef496ffe8234c8fe6e0a526d20d80591b441

    • SHA512

      8ac5d6876add97f2b26b7ef5bca75a5b787df5cbb3786ce881088a1876a911a5c7053e7d3968f587e313c17a4f31be8dfc326a2dc945ed866e7f1f62a35f072c

    • SSDEEP

      24576:CyoUOWgh6k0MJgi20MWNMjV9M0LwrYFL7U6RWS0bmmP6xGQM6:po1Wvk0+novw0FLQgWS0uxS

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks