General

  • Target

    f9849d3cef4b3b543463d4ac5a0f1b26c835d3fc3aaf99e4254a3bc8ae6a46a9

  • Size

    1.0MB

  • Sample

    230414-hnyh2aab9v

  • MD5

    9c4db766301eefe5e59e78d3b8e9f12e

  • SHA1

    056b28c14fe29210e4378486b8949274b9a18a3d

  • SHA256

    f9849d3cef4b3b543463d4ac5a0f1b26c835d3fc3aaf99e4254a3bc8ae6a46a9

  • SHA512

    f5ae511b56c86f83f79e55733ccf0bc022044c778930b5168a433d0e8be08a48308479ab6b5e6aeceae2c88d755f8abe56a86039682ebb28d289553ea7d8d6fa

  • SSDEEP

    24576:AyLeh/F8K8CUK1a6LVRy/L9dbNa8250YneIolz2O5P7EPmjemZ:HLPKcKlLi9dNo/eBz2O5P4Pmjem

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      f9849d3cef4b3b543463d4ac5a0f1b26c835d3fc3aaf99e4254a3bc8ae6a46a9

    • Size

      1.0MB

    • MD5

      9c4db766301eefe5e59e78d3b8e9f12e

    • SHA1

      056b28c14fe29210e4378486b8949274b9a18a3d

    • SHA256

      f9849d3cef4b3b543463d4ac5a0f1b26c835d3fc3aaf99e4254a3bc8ae6a46a9

    • SHA512

      f5ae511b56c86f83f79e55733ccf0bc022044c778930b5168a433d0e8be08a48308479ab6b5e6aeceae2c88d755f8abe56a86039682ebb28d289553ea7d8d6fa

    • SSDEEP

      24576:AyLeh/F8K8CUK1a6LVRy/L9dbNa8250YneIolz2O5P7EPmjemZ:HLPKcKlLi9dNo/eBz2O5P4Pmjem

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks