General

  • Target

    2969cb8d6a5988e5dea72f1a927bf3eafac804ba51bcf202bcac16f8d9ef79da

  • Size

    1.2MB

  • Sample

    230414-pjvpxabc2s

  • MD5

    779bc7b2e0836a7945c94d0e420467e1

  • SHA1

    4697a36f30ab23389b3ec5a5605430f10ed9daea

  • SHA256

    2969cb8d6a5988e5dea72f1a927bf3eafac804ba51bcf202bcac16f8d9ef79da

  • SHA512

    38f04accde54534cf79e3829951944521d2cd1f95e702511df77a90c245d576b400115e8053919422fad73049932b24d82960e86fac16518b3b369312abfe5e2

  • SSDEEP

    24576:4y9YCSUG43ijmgDdgpB8FCHiL877kB3vOjhsgL0JacAY1C1PmTJXl2J72:/9YCSUG4SdDiU8XuvOqgL0TW+To

Malware Config

Extracted

Family

redline

Botnet

soft

C2

77.91.124.146:4121

Attributes
  • auth_value

    e65663e455bca3c5699650b66e76ceaa

Extracted

Family

redline

Botnet

dirx

C2

77.91.124.146:4121

Attributes
  • auth_value

    522d988f763be056e53e089f74d464cc

Targets

    • Target

      2969cb8d6a5988e5dea72f1a927bf3eafac804ba51bcf202bcac16f8d9ef79da

    • Size

      1.2MB

    • MD5

      779bc7b2e0836a7945c94d0e420467e1

    • SHA1

      4697a36f30ab23389b3ec5a5605430f10ed9daea

    • SHA256

      2969cb8d6a5988e5dea72f1a927bf3eafac804ba51bcf202bcac16f8d9ef79da

    • SHA512

      38f04accde54534cf79e3829951944521d2cd1f95e702511df77a90c245d576b400115e8053919422fad73049932b24d82960e86fac16518b3b369312abfe5e2

    • SSDEEP

      24576:4y9YCSUG43ijmgDdgpB8FCHiL877kB3vOjhsgL0JacAY1C1PmTJXl2J72:/9YCSUG4SdDiU8XuvOqgL0TW+To

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks