General

  • Target

    5a341d18d79f62e3916471a5077693d555b7a35c10e9d64addf72f04d5616ea7

  • Size

    1.0MB

  • Sample

    230415-hb1smadc95

  • MD5

    5ec483049c1197d58bb69cc654e49c9c

  • SHA1

    21a59ac3209b9c2f78c15d250309ba1e4630a1c3

  • SHA256

    5a341d18d79f62e3916471a5077693d555b7a35c10e9d64addf72f04d5616ea7

  • SHA512

    990b02a7e92c57ccb1d715f059bbf7242451a0bd1d6ec2f93a84c147c0e2009e19f0daed99c7e9bc2ae99e69561e7fe585aa59e03c2587e45a332073a1f6a1da

  • SSDEEP

    12288:+Mriy90qGdCmRl6C2+GoSFm6Pe7rUJCBp7RJ8giJ3Krh6u6DsoGTKQil1X8egK0S:wyGVxTUA7RJ8gMKrh948lVjR5SJYiWY

Malware Config

Extracted

Family

redline

Botnet

soft

C2

77.91.124.146:4121

Attributes
  • auth_value

    e65663e455bca3c5699650b66e76ceaa

Extracted

Family

redline

Botnet

dirx

C2

77.91.124.146:4121

Attributes
  • auth_value

    522d988f763be056e53e089f74d464cc

Targets

    • Target

      5a341d18d79f62e3916471a5077693d555b7a35c10e9d64addf72f04d5616ea7

    • Size

      1.0MB

    • MD5

      5ec483049c1197d58bb69cc654e49c9c

    • SHA1

      21a59ac3209b9c2f78c15d250309ba1e4630a1c3

    • SHA256

      5a341d18d79f62e3916471a5077693d555b7a35c10e9d64addf72f04d5616ea7

    • SHA512

      990b02a7e92c57ccb1d715f059bbf7242451a0bd1d6ec2f93a84c147c0e2009e19f0daed99c7e9bc2ae99e69561e7fe585aa59e03c2587e45a332073a1f6a1da

    • SSDEEP

      12288:+Mriy90qGdCmRl6C2+GoSFm6Pe7rUJCBp7RJ8giJ3Krh6u6DsoGTKQil1X8egK0S:wyGVxTUA7RJ8gMKrh948lVjR5SJYiWY

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks