General

  • Target

    c2c9ceefab1f8c3e606b02c22e40090e3df0be35b567658765f847962dd920b6

  • Size

    924KB

  • Sample

    230505-x55q1abd2y

  • MD5

    161c9a0fb3a9de0c700cbe0ab6bb2cc0

  • SHA1

    2edc949e1e426c41ef0b1cc178aef21ead1ef61c

  • SHA256

    c2c9ceefab1f8c3e606b02c22e40090e3df0be35b567658765f847962dd920b6

  • SHA512

    70df0c1d35f343ce18246de44226c7b21be0f78912887532b410b818807f2ee0930a125605e184631c759b1ef6a137508439fd2af3740ba6f8ec1e4219daec29

  • SSDEEP

    24576:By5RAulxm4DeRvVznUJ3cE7hoRJC3u2Q5/2x:05RAkm4DynUZcE76LC3S5+

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      c2c9ceefab1f8c3e606b02c22e40090e3df0be35b567658765f847962dd920b6

    • Size

      924KB

    • MD5

      161c9a0fb3a9de0c700cbe0ab6bb2cc0

    • SHA1

      2edc949e1e426c41ef0b1cc178aef21ead1ef61c

    • SHA256

      c2c9ceefab1f8c3e606b02c22e40090e3df0be35b567658765f847962dd920b6

    • SHA512

      70df0c1d35f343ce18246de44226c7b21be0f78912887532b410b818807f2ee0930a125605e184631c759b1ef6a137508439fd2af3740ba6f8ec1e4219daec29

    • SSDEEP

      24576:By5RAulxm4DeRvVznUJ3cE7hoRJC3u2Q5/2x:05RAkm4DynUZcE76LC3S5+

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks