General

  • Target

    c52ddc609067ba0597e0f3ad84f47bf9e2889a1a703cda5292dfb2da8ce75a08

  • Size

    490KB

  • Sample

    230510-hyqaeaef72

  • MD5

    edffcb804b4994a0d5367f52bff0e579

  • SHA1

    8d395fb7c2352b5545737d5e034c1d40fbeb473d

  • SHA256

    c52ddc609067ba0597e0f3ad84f47bf9e2889a1a703cda5292dfb2da8ce75a08

  • SHA512

    912fe029d0c6db4e0fb71e81c1dad854f1fee22e17547ae025eb32633827f9dd6c5fc05e628ff52dee48bae543736924dbc2a888f5bf85799a9e6034ed526471

  • SSDEEP

    12288:1Mrky90Sp8SAUdc6Hi5elZ2kNRJUtdVQKo9:hyL86BAeEBJo9

Malware Config

Extracted

Family

redline

Botnet

lurfa

C2

217.196.96.102:4132

Attributes
  • auth_value

    f6c26c2a5c6c25ae5b2e9abf31f6341d

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      c52ddc609067ba0597e0f3ad84f47bf9e2889a1a703cda5292dfb2da8ce75a08

    • Size

      490KB

    • MD5

      edffcb804b4994a0d5367f52bff0e579

    • SHA1

      8d395fb7c2352b5545737d5e034c1d40fbeb473d

    • SHA256

      c52ddc609067ba0597e0f3ad84f47bf9e2889a1a703cda5292dfb2da8ce75a08

    • SHA512

      912fe029d0c6db4e0fb71e81c1dad854f1fee22e17547ae025eb32633827f9dd6c5fc05e628ff52dee48bae543736924dbc2a888f5bf85799a9e6034ed526471

    • SSDEEP

      12288:1Mrky90Sp8SAUdc6Hi5elZ2kNRJUtdVQKo9:hyL86BAeEBJo9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks