General

  • Target

    a5b95a64b5ea65e576a16906ddf88a1dd70a894fb07e7ad9dfd741e2e9041121

  • Size

    490KB

  • Sample

    230510-etkycagb5s

  • MD5

    b0bb1891bb53d12750d6b88b6e981cb9

  • SHA1

    927e9e3e98eed6af5b729158f48256753c8426b9

  • SHA256

    a5b95a64b5ea65e576a16906ddf88a1dd70a894fb07e7ad9dfd741e2e9041121

  • SHA512

    e7ec96e1778507284ba30a48f21afd73de8d6a2b1567140093fcdad9f7ba9d3a6a42942f535c44f8670d8c2e0eb6dea37cfb659db5a983eeee5b1af39f0015f9

  • SSDEEP

    12288:4MrVy909If9AwdbFXPdec2QW8CWomjGIwYPCriR:tyKIVbdbFXPgcz9C6jGIHb

Malware Config

Extracted

Family

redline

Botnet

lurfa

C2

217.196.96.102:4132

Attributes
  • auth_value

    f6c26c2a5c6c25ae5b2e9abf31f6341d

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

redline

Botnet

cheat

C2

194.87.151.202:9578

Targets

    • Target

      a5b95a64b5ea65e576a16906ddf88a1dd70a894fb07e7ad9dfd741e2e9041121

    • Size

      490KB

    • MD5

      b0bb1891bb53d12750d6b88b6e981cb9

    • SHA1

      927e9e3e98eed6af5b729158f48256753c8426b9

    • SHA256

      a5b95a64b5ea65e576a16906ddf88a1dd70a894fb07e7ad9dfd741e2e9041121

    • SHA512

      e7ec96e1778507284ba30a48f21afd73de8d6a2b1567140093fcdad9f7ba9d3a6a42942f535c44f8670d8c2e0eb6dea37cfb659db5a983eeee5b1af39f0015f9

    • SSDEEP

      12288:4MrVy909If9AwdbFXPdec2QW8CWomjGIwYPCriR:tyKIVbdbFXPgcz9C6jGIHb

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks