General

  • Target

    0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790.bin

  • Size

    1.4MB

  • Sample

    230506-y76xhsbf32

  • MD5

    1426bc8713b266da50f4e8087724b6ef

  • SHA1

    fbd881983e4adf5b980f2b1da37906d6de810f8f

  • SHA256

    0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790

  • SHA512

    1cea06e97efd9643443b75a07247af9be52707057c553bfa2c574aa46e92f664b55c4250877f9e985e1476245f7397227e5d1883cde09a7cd0f4f1facb8b897d

  • SSDEEP

    24576:wyoQBlSECSvq/KktHZS2cfRt8QWTaC719h76aspnAq8as8Pg/qqryC2p:3ml/Dt5S2OuQW2C71H7SdcN8P8

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Targets

    • Target

      0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790.bin

    • Size

      1.4MB

    • MD5

      1426bc8713b266da50f4e8087724b6ef

    • SHA1

      fbd881983e4adf5b980f2b1da37906d6de810f8f

    • SHA256

      0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790

    • SHA512

      1cea06e97efd9643443b75a07247af9be52707057c553bfa2c574aa46e92f664b55c4250877f9e985e1476245f7397227e5d1883cde09a7cd0f4f1facb8b897d

    • SSDEEP

      24576:wyoQBlSECSvq/KktHZS2cfRt8QWTaC719h76aspnAq8as8Pg/qqryC2p:3ml/Dt5S2OuQW2C71H7SdcN8P8

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks