General

  • Target

    c3b75e0ec04b9727cfbeb13e7b2ef2f540263cdd4a8f11058d5e5208ab91cf36

  • Size

    1.2MB

  • Sample

    230414-jbcw8sad4z

  • MD5

    3908fb258b5b259480a418d3c35d6028

  • SHA1

    bca6961e93df20ddeb3850e0d73c487ef094cc79

  • SHA256

    c3b75e0ec04b9727cfbeb13e7b2ef2f540263cdd4a8f11058d5e5208ab91cf36

  • SHA512

    96240f46f429ff45ed8697d923386896bcd78c55278d1654a6762e9ad978e06cb2b406865e7a492dfcf7f3a81e3c1485cccb63cbc857e58b2dbf5f8c7f7452ed

  • SSDEEP

    24576:yyNtvFgBNPFG8rdabJ953ViaYLaS7Hc16EqlgOCtqxGmV:ZNtvuN08rdaB3gagA6f6sxGm

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      c3b75e0ec04b9727cfbeb13e7b2ef2f540263cdd4a8f11058d5e5208ab91cf36

    • Size

      1.2MB

    • MD5

      3908fb258b5b259480a418d3c35d6028

    • SHA1

      bca6961e93df20ddeb3850e0d73c487ef094cc79

    • SHA256

      c3b75e0ec04b9727cfbeb13e7b2ef2f540263cdd4a8f11058d5e5208ab91cf36

    • SHA512

      96240f46f429ff45ed8697d923386896bcd78c55278d1654a6762e9ad978e06cb2b406865e7a492dfcf7f3a81e3c1485cccb63cbc857e58b2dbf5f8c7f7452ed

    • SSDEEP

      24576:yyNtvFgBNPFG8rdabJ953ViaYLaS7Hc16EqlgOCtqxGmV:ZNtvuN08rdaB3gagA6f6sxGm

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks