General

  • Target

    3a5feaa7104b951210b506fb6ab0cec9e44b4091883803e01f55aa444dac2e84

  • Size

    706KB

  • Sample

    230414-k1wlbahc68

  • MD5

    69a3dc0e5303dac4d5f5c21f5765e7ac

  • SHA1

    522c8332d9dcda74157036a4b1d3537c1ffdc97e

  • SHA256

    3a5feaa7104b951210b506fb6ab0cec9e44b4091883803e01f55aa444dac2e84

  • SHA512

    a7e395864372600db914cc96b9c0ff5a8fd6eb7349cd5d8e0cfec0270d1afeead0bfe7067ec0a507737265064c73029dae08b84b5730e694a2f3bafc3d8ac0b6

  • SSDEEP

    12288:SMrSy906RGxJ64V74lAiCCdqeOzVNdvGsVLsqQWmhQcjx/EpBT:wyjGbv94aiwhJXQW8njx/EpN

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Targets

    • Target

      3a5feaa7104b951210b506fb6ab0cec9e44b4091883803e01f55aa444dac2e84

    • Size

      706KB

    • MD5

      69a3dc0e5303dac4d5f5c21f5765e7ac

    • SHA1

      522c8332d9dcda74157036a4b1d3537c1ffdc97e

    • SHA256

      3a5feaa7104b951210b506fb6ab0cec9e44b4091883803e01f55aa444dac2e84

    • SHA512

      a7e395864372600db914cc96b9c0ff5a8fd6eb7349cd5d8e0cfec0270d1afeead0bfe7067ec0a507737265064c73029dae08b84b5730e694a2f3bafc3d8ac0b6

    • SSDEEP

      12288:SMrSy906RGxJ64V74lAiCCdqeOzVNdvGsVLsqQWmhQcjx/EpBT:wyjGbv94aiwhJXQW8njx/EpN

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks