General

  • Target

    97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402

  • Size

    1.0MB

  • Sample

    230414-kszyrshc35

  • MD5

    3ffb7f4de72fe068b515eb1e0b8c2c32

  • SHA1

    59b3e195e77f8f6479d326444ffceaca32116089

  • SHA256

    97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402

  • SHA512

    bedc59ba5febc665f28b6d0586f8d69c82e0a642540768de4dcc0a5b6c3b4ca4788df67cfb830a9a508ab7f55d1da3cda1908c2c9865b605b19499eabb1eac74

  • SSDEEP

    12288:NMray909cR1Rm5yu4oBRvJ6udXCOVqa46c1vDZ95ys5A10oNori18tiYKOE:XyKLyu4I3dcf1l95BGf+M

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Targets

    • Target

      97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402

    • Size

      1.0MB

    • MD5

      3ffb7f4de72fe068b515eb1e0b8c2c32

    • SHA1

      59b3e195e77f8f6479d326444ffceaca32116089

    • SHA256

      97594aff04bde2a86a7c3a33f68777d81b93a15ac6b86d790d237d324ee50402

    • SHA512

      bedc59ba5febc665f28b6d0586f8d69c82e0a642540768de4dcc0a5b6c3b4ca4788df67cfb830a9a508ab7f55d1da3cda1908c2c9865b605b19499eabb1eac74

    • SSDEEP

      12288:NMray909cR1Rm5yu4oBRvJ6udXCOVqa46c1vDZ95ys5A10oNori18tiYKOE:XyKLyu4I3dcf1l95BGf+M

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks