General

  • Target

    e2887f7aa8f1414494e1811d62cd429e26d5dffb94f2bef873203a4db4c4b473

  • Size

    492KB

  • Sample

    230506-s2svtaca3y

  • MD5

    84b31f0ba80b863b961aa8285a590d48

  • SHA1

    81bd5efa86dc9f307560d6df6d60f3eda99fb2cc

  • SHA256

    e2887f7aa8f1414494e1811d62cd429e26d5dffb94f2bef873203a4db4c4b473

  • SHA512

    b63fd87240e827d627f3b3931329fdb4bebefd6b1b03a095fc3fa6269e218515ecb3193cb8ad51b42bf12a83b2928c96dff4ccea64301c680ca7c6746b59c355

  • SSDEEP

    12288:bMr8y90i+gO2bSfpf0t1I8TJgRlqV7dbbPAXiwBq:HyzbUMt11iEVRAXiwBq

Malware Config

Extracted

Family

redline

Botnet

luna

C2

217.196.96.101:4132

Attributes
  • auth_value

    3372be6f6fa192ff878fa6fe9be73f6e

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      e2887f7aa8f1414494e1811d62cd429e26d5dffb94f2bef873203a4db4c4b473

    • Size

      492KB

    • MD5

      84b31f0ba80b863b961aa8285a590d48

    • SHA1

      81bd5efa86dc9f307560d6df6d60f3eda99fb2cc

    • SHA256

      e2887f7aa8f1414494e1811d62cd429e26d5dffb94f2bef873203a4db4c4b473

    • SHA512

      b63fd87240e827d627f3b3931329fdb4bebefd6b1b03a095fc3fa6269e218515ecb3193cb8ad51b42bf12a83b2928c96dff4ccea64301c680ca7c6746b59c355

    • SSDEEP

      12288:bMr8y90i+gO2bSfpf0t1I8TJgRlqV7dbbPAXiwBq:HyzbUMt11iEVRAXiwBq

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks