General

  • Target

    4c457d9a5596353607fe4020629c43af4414f7540cec3693e5db6e5724fcb3ea

  • Size

    2.7MB

  • Sample

    230612-dhbpvsbc4w

  • MD5

    f9641c1b7583d49ab5d23b89fee3b5a9

  • SHA1

    11e6ba6c1177b0923fccb907805ff6b6b9da674f

  • SHA256

    4c457d9a5596353607fe4020629c43af4414f7540cec3693e5db6e5724fcb3ea

  • SHA512

    689f4fe3f3c05f9b54556236862008555a3a2ca5f205344f6635bb661ab970325d7155bbe959443b58f549bd6342d5cec316b7cda3e3e23f0add95664c3fc415

  • SSDEEP

    49152:HwP1G8AJ8GTh4bimxjg35JN5i/R9E1DWC5K7czXPZiAQFOlmmbKDtCYXUz:EG8AXq1wDiZuDWCMczXPZiAQFOlmmbK0

Malware Config

Extracted

Family

redline

Botnet

100623_11_red

C2

goodlogs.neverever.ug:11615

Attributes
  • auth_value

    d577b491cdc8c8d4548b1bf2542f3468

Extracted

Family

amadey

Version

3.80

C2

45.15.156.208/jd9dd3Vw/index.php

second.amadgood.com/jd9dd3Vw/index.php

Extracted

Family

redline

Botnet

MeAm

C2

165.22.100.96:81

Attributes
  • auth_value

    a978b0ab23ddf47bb972278e7b486593

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79

Targets

    • Target

      4c457d9a5596353607fe4020629c43af4414f7540cec3693e5db6e5724fcb3ea

    • Size

      2.7MB

    • MD5

      f9641c1b7583d49ab5d23b89fee3b5a9

    • SHA1

      11e6ba6c1177b0923fccb907805ff6b6b9da674f

    • SHA256

      4c457d9a5596353607fe4020629c43af4414f7540cec3693e5db6e5724fcb3ea

    • SHA512

      689f4fe3f3c05f9b54556236862008555a3a2ca5f205344f6635bb661ab970325d7155bbe959443b58f549bd6342d5cec316b7cda3e3e23f0add95664c3fc415

    • SSDEEP

      49152:HwP1G8AJ8GTh4bimxjg35JN5i/R9E1DWC5K7czXPZiAQFOlmmbKDtCYXUz:EG8AXq1wDiZuDWCMczXPZiAQFOlmmbK0

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks