General

  • Target

    e24edcab6525210c829ae5a0e12461412ad59cec9b92db671b9fb3d6afe1edc7

  • Size

    1002KB

  • Sample

    230421-zzbbbabg7x

  • MD5

    3bd89c4338edfc226af24673696bafe4

  • SHA1

    76062f87ea738b025a0015e8b367f01fe12ae0f8

  • SHA256

    e24edcab6525210c829ae5a0e12461412ad59cec9b92db671b9fb3d6afe1edc7

  • SHA512

    0828152390ccb9560333d25e4afcd8d37fbd8bffc68edc9b478160c7a4eb302c1397d7dec5923904c35a3023efdf515826e69bfed581fb40a408eb6631e8eec2

  • SSDEEP

    24576:cys7Me6ewbWZrSNxxgLR03B6LVu1cxoNWbLvY+l6Hdf:LLe/K5CR03YJgYvYUAd

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

special

C2

176.123.9.142:14845

Attributes
  • auth_value

    bb28ee957fad348ef1dfce97134849bc

Extracted

Family

redline

Botnet

cheat

C2

62.108.37.195:16060

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e

Targets

    • Target

      e24edcab6525210c829ae5a0e12461412ad59cec9b92db671b9fb3d6afe1edc7

    • Size

      1002KB

    • MD5

      3bd89c4338edfc226af24673696bafe4

    • SHA1

      76062f87ea738b025a0015e8b367f01fe12ae0f8

    • SHA256

      e24edcab6525210c829ae5a0e12461412ad59cec9b92db671b9fb3d6afe1edc7

    • SHA512

      0828152390ccb9560333d25e4afcd8d37fbd8bffc68edc9b478160c7a4eb302c1397d7dec5923904c35a3023efdf515826e69bfed581fb40a408eb6631e8eec2

    • SSDEEP

      24576:cys7Me6ewbWZrSNxxgLR03B6LVu1cxoNWbLvY+l6Hdf:LLe/K5CR03YJgYvYUAd

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks