General

  • Target

    e5be911860f3e6ccb9777f48b9613d919d4f6b2ab8c99e428067db05dac01cb9

  • Size

    1.0MB

  • Sample

    230421-qxnn7afg75

  • MD5

    349194ac3465991819d7b37ba01bdb4d

  • SHA1

    f5649c7a26b25cd0d6183a6206689407362c12ea

  • SHA256

    e5be911860f3e6ccb9777f48b9613d919d4f6b2ab8c99e428067db05dac01cb9

  • SHA512

    137b141247cb0988dfd42bcc825aedd2c1538431e99cf28253c5de2538adfb90a8fc41f7dc2716289fd47e8228c333dc58f9a9ae3e1ccefe5ea0dc2e150fb2b3

  • SSDEEP

    24576:GyoM7IPacpbZcYRKgZyu5mkl8GMIS1tBGfNR7k9Q:V9CqY95jSpfY1RI9

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

cheat

C2

62.108.37.195:16060

Extracted

Family

redline

Botnet

special

C2

176.123.9.142:14845

Attributes
  • auth_value

    bb28ee957fad348ef1dfce97134849bc

Targets

    • Target

      e5be911860f3e6ccb9777f48b9613d919d4f6b2ab8c99e428067db05dac01cb9

    • Size

      1.0MB

    • MD5

      349194ac3465991819d7b37ba01bdb4d

    • SHA1

      f5649c7a26b25cd0d6183a6206689407362c12ea

    • SHA256

      e5be911860f3e6ccb9777f48b9613d919d4f6b2ab8c99e428067db05dac01cb9

    • SHA512

      137b141247cb0988dfd42bcc825aedd2c1538431e99cf28253c5de2538adfb90a8fc41f7dc2716289fd47e8228c333dc58f9a9ae3e1ccefe5ea0dc2e150fb2b3

    • SSDEEP

      24576:GyoM7IPacpbZcYRKgZyu5mkl8GMIS1tBGfNR7k9Q:V9CqY95jSpfY1RI9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks