General

  • Target

    0e911d7456599434f1ef8839ce885758dee2e3136798bdeab8a5e795f236c786.bin

  • Size

    1.5MB

  • Sample

    230506-2267waha21

  • MD5

    0f7607afbf6b38bee4f3f4318a00a10c

  • SHA1

    c49a50c0717b5a5a2b6c8a5a2486d45c7b7a67e8

  • SHA256

    0e911d7456599434f1ef8839ce885758dee2e3136798bdeab8a5e795f236c786

  • SHA512

    1f58c01a4a36344573a7c13cf6bfb11071996bf5d2c0adfc35215bc45d910e4877e6d7f6a3ef5c4b0940ae7a7d820a7f85e418dac61b6e584dbcc507cd6c3025

  • SSDEEP

    24576:AyoFeJ/0tV4GcQ1HCXkttLZU0AyJogIs8dAFIHoxSvMXgmOGl0Q6r:HoFeJ/0tV4GcQCUtBG/g/8G4eSvTCl

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      0e911d7456599434f1ef8839ce885758dee2e3136798bdeab8a5e795f236c786.bin

    • Size

      1.5MB

    • MD5

      0f7607afbf6b38bee4f3f4318a00a10c

    • SHA1

      c49a50c0717b5a5a2b6c8a5a2486d45c7b7a67e8

    • SHA256

      0e911d7456599434f1ef8839ce885758dee2e3136798bdeab8a5e795f236c786

    • SHA512

      1f58c01a4a36344573a7c13cf6bfb11071996bf5d2c0adfc35215bc45d910e4877e6d7f6a3ef5c4b0940ae7a7d820a7f85e418dac61b6e584dbcc507cd6c3025

    • SSDEEP

      24576:AyoFeJ/0tV4GcQ1HCXkttLZU0AyJogIs8dAFIHoxSvMXgmOGl0Q6r:HoFeJ/0tV4GcQCUtBG/g/8G4eSvTCl

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks