General

  • Target

    e74fbe82f534f32d22b95e3cd3b10e193846c455e10eefe36e101e2dc501a570

  • Size

    1.2MB

  • Sample

    230503-pcfmeage3t

  • MD5

    829415becfb69ce5de08906be1b3ca2c

  • SHA1

    efd2da1a6e90fc565c8d81ac3798869a97d66fa5

  • SHA256

    e74fbe82f534f32d22b95e3cd3b10e193846c455e10eefe36e101e2dc501a570

  • SHA512

    367044d5905b95925f54df55a91de414957ec21e5ddcf3de996e7c16b7cbbc5b41eeeea083487dbd49e4140699fbaf0bfc18c840471206aaf70daa5ca41225ae

  • SSDEEP

    24576:iysMhQxA84oXlKuDWQcWv9HeqvwWqIVzUT+Tk9d:JsMhQxVZXDWQci9HeqvwW7xFc

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      e74fbe82f534f32d22b95e3cd3b10e193846c455e10eefe36e101e2dc501a570

    • Size

      1.2MB

    • MD5

      829415becfb69ce5de08906be1b3ca2c

    • SHA1

      efd2da1a6e90fc565c8d81ac3798869a97d66fa5

    • SHA256

      e74fbe82f534f32d22b95e3cd3b10e193846c455e10eefe36e101e2dc501a570

    • SHA512

      367044d5905b95925f54df55a91de414957ec21e5ddcf3de996e7c16b7cbbc5b41eeeea083487dbd49e4140699fbaf0bfc18c840471206aaf70daa5ca41225ae

    • SSDEEP

      24576:iysMhQxA84oXlKuDWQcWv9HeqvwWqIVzUT+Tk9d:JsMhQxVZXDWQci9HeqvwW7xFc

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks