General

  • Target

    4910c00a67717235afae2f032f09eb82b425e21c6e230d4295d1bd0eb559b602

  • Size

    1016KB

  • Sample

    230421-r1a3yaaa4z

  • MD5

    77b6153bd1db0cadebf2eeb298f3ce15

  • SHA1

    31a7cf3a1f16353e5a8a91e9575663fcd19ed7f8

  • SHA256

    4910c00a67717235afae2f032f09eb82b425e21c6e230d4295d1bd0eb559b602

  • SHA512

    8a976b81c6cc526e376d5a3b4a8048d928325c979a520c5315a20bc7bc5b9059a7b03e11840c42ffe9f8170dc9b39a356634ebd19270a47b6e5f04ceac8d4dde

  • SSDEEP

    12288:Vy90t2JXFJTyWtbG470WsPYs1yiKsWrMN9geLYV93reLKXqNcEICBmM+vssKxzLc:Vygey07lCYs42tg7e2cBICsQZOShw

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

special

C2

176.123.9.142:14845

Attributes
  • auth_value

    bb28ee957fad348ef1dfce97134849bc

Extracted

Family

redline

Botnet

cheat

C2

62.108.37.195:16060

Extracted

Family

redline

Botnet

Heavan Dave

C2

199.115.193.116:15763

Attributes
  • auth_value

    53923b5ff123b63db4445e5dfd21c16f

Targets

    • Target

      4910c00a67717235afae2f032f09eb82b425e21c6e230d4295d1bd0eb559b602

    • Size

      1016KB

    • MD5

      77b6153bd1db0cadebf2eeb298f3ce15

    • SHA1

      31a7cf3a1f16353e5a8a91e9575663fcd19ed7f8

    • SHA256

      4910c00a67717235afae2f032f09eb82b425e21c6e230d4295d1bd0eb559b602

    • SHA512

      8a976b81c6cc526e376d5a3b4a8048d928325c979a520c5315a20bc7bc5b9059a7b03e11840c42ffe9f8170dc9b39a356634ebd19270a47b6e5f04ceac8d4dde

    • SSDEEP

      12288:Vy90t2JXFJTyWtbG470WsPYs1yiKsWrMN9geLYV93reLKXqNcEICBmM+vssKxzLc:Vygey07lCYs42tg7e2cBICsQZOShw

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks