General

  • Target

    7f5b839e2fc1a4b8ccb8c8921fd1c285ada709ccf70fc79fae7d45dec8638081.bin

  • Size

    1.2MB

  • Sample

    230501-vqxqqshf4z

  • MD5

    f701fca2bbe18909bcaf9e6fe7011e91

  • SHA1

    e1b8ce62959cf80945e8a30839bdc2d17b8deaf7

  • SHA256

    7f5b839e2fc1a4b8ccb8c8921fd1c285ada709ccf70fc79fae7d45dec8638081

  • SHA512

    4e2d1e26f6c677ca60f47419a90e558e12e2909595efbe4e7693e8550263efc21df8729d05e57c932ec7e629897c844302ce8eece1e3f5412e2ad3a0152acbb6

  • SSDEEP

    24576:kyUcMAqfiR8FFDXPyYXDFP146de/0yEXCrQjDiXT6hk:zUvjfiRyX5zF/dW0yw+Qne6

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Targets

    • Target

      7f5b839e2fc1a4b8ccb8c8921fd1c285ada709ccf70fc79fae7d45dec8638081.bin

    • Size

      1.2MB

    • MD5

      f701fca2bbe18909bcaf9e6fe7011e91

    • SHA1

      e1b8ce62959cf80945e8a30839bdc2d17b8deaf7

    • SHA256

      7f5b839e2fc1a4b8ccb8c8921fd1c285ada709ccf70fc79fae7d45dec8638081

    • SHA512

      4e2d1e26f6c677ca60f47419a90e558e12e2909595efbe4e7693e8550263efc21df8729d05e57c932ec7e629897c844302ce8eece1e3f5412e2ad3a0152acbb6

    • SSDEEP

      24576:kyUcMAqfiR8FFDXPyYXDFP146de/0yEXCrQjDiXT6hk:zUvjfiRyX5zF/dW0yw+Qne6

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks