General

  • Target

    9b455f06c676e15e745352c7bd8f8296aba37b00af961b4e2b74ce71fe1ffef6

  • Size

    1.5MB

  • Sample

    230414-jw1tssha84

  • MD5

    78dde2c29cc481e320b28c85bef19db2

  • SHA1

    8d7fb89b97bbcedfd870878ce3849cfe4132c972

  • SHA256

    9b455f06c676e15e745352c7bd8f8296aba37b00af961b4e2b74ce71fe1ffef6

  • SHA512

    5c1583861e2b787eec5aa983530240501903736e8b21c27ee981aa77efe32d84666fb53b9a7721cebbb8b4b7af165cd405aaad60a11fa1d36f4f9651a3396d26

  • SSDEEP

    49152:QZmO0bkkK9ZTTpFDX+WxUHdKg1hV8eVg6966Vaz1VJQK:kmO0NKrTT8nhVnhCNd

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Extracted

Family

redline

Botnet

masi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6e26457e57602c4cf35356c36d8dd8e8

Targets

    • Target

      9b455f06c676e15e745352c7bd8f8296aba37b00af961b4e2b74ce71fe1ffef6

    • Size

      1.5MB

    • MD5

      78dde2c29cc481e320b28c85bef19db2

    • SHA1

      8d7fb89b97bbcedfd870878ce3849cfe4132c972

    • SHA256

      9b455f06c676e15e745352c7bd8f8296aba37b00af961b4e2b74ce71fe1ffef6

    • SHA512

      5c1583861e2b787eec5aa983530240501903736e8b21c27ee981aa77efe32d84666fb53b9a7721cebbb8b4b7af165cd405aaad60a11fa1d36f4f9651a3396d26

    • SSDEEP

      49152:QZmO0bkkK9ZTTpFDX+WxUHdKg1hV8eVg6966Vaz1VJQK:kmO0NKrTT8nhVnhCNd

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks