General

  • Target

    e3ddbfc87c915d61a973533f066fdc08dcc209c97c651a5c4e043409784aba81.bin

  • Size

    1.5MB

  • Sample

    230505-yxxk4abg95

  • MD5

    feefc06eeee4c4dd9681362c5ffdb18e

  • SHA1

    3afd9f8a93b0cf447756780fe46a0fc6904a8651

  • SHA256

    e3ddbfc87c915d61a973533f066fdc08dcc209c97c651a5c4e043409784aba81

  • SHA512

    ce204de04d640d4ca66f5e32c94a4de4a7506f53ea2283e12460a61463dd06d55fad645f650bf7f9a282cc7b0a0c36af00e108bd8f0bda7e2029e9bfdd591b27

  • SSDEEP

    24576:0yRX6IzwftAdw8klCBthIkcB/WcTEMQZjyxkoY/n8EfIw0Q5X9iE/L35KcT+:DtFACdrklot+kUTT2ZuyUEfIwj5XwYp

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Targets

    • Target

      e3ddbfc87c915d61a973533f066fdc08dcc209c97c651a5c4e043409784aba81.bin

    • Size

      1.5MB

    • MD5

      feefc06eeee4c4dd9681362c5ffdb18e

    • SHA1

      3afd9f8a93b0cf447756780fe46a0fc6904a8651

    • SHA256

      e3ddbfc87c915d61a973533f066fdc08dcc209c97c651a5c4e043409784aba81

    • SHA512

      ce204de04d640d4ca66f5e32c94a4de4a7506f53ea2283e12460a61463dd06d55fad645f650bf7f9a282cc7b0a0c36af00e108bd8f0bda7e2029e9bfdd591b27

    • SSDEEP

      24576:0yRX6IzwftAdw8klCBthIkcB/WcTEMQZjyxkoY/n8EfIw0Q5X9iE/L35KcT+:DtFACdrklot+kUTT2ZuyUEfIwj5XwYp

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks