General

  • Target

    90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e

  • Size

    238KB

  • Sample

    230508-3nhsssfb5x

  • MD5

    c23d62c9166ae248fe9fe078328182f9

  • SHA1

    ce684054121205b1cd7befc016644680fd5b29d5

  • SHA256

    90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e

  • SHA512

    1f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57

  • SSDEEP

    6144:qZOKsgHE8srZb6sbJ42UqQqcuFCXogRNEFWa0:RpBJuqsuFCXogRNI0

Malware Config

Extracted

Family

amadey

Version

3.70

C2

tadogem.com/dF30Hn4m/index.php

Extracted

Family

redline

C2

135.181.11.39:21717

Attributes
  • auth_value

    8371c94cfa5b9230afb9ccb73536d331

Extracted

Family

systembc

C2

65.21.119.52:4277

localhost.exchange:4277

Targets

    • Target

      90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e

    • Size

      238KB

    • MD5

      c23d62c9166ae248fe9fe078328182f9

    • SHA1

      ce684054121205b1cd7befc016644680fd5b29d5

    • SHA256

      90fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e

    • SHA512

      1f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57

    • SSDEEP

      6144:qZOKsgHE8srZb6sbJ42UqQqcuFCXogRNEFWa0:RpBJuqsuFCXogRNI0

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks