General

  • Target

    2d624c7f085397f0872e01bdf813bdc4.bin

  • Size

    534KB

  • Sample

    230613-bgec9aeh21

  • MD5

    349964de5ee5177db9266e10d3b69681

  • SHA1

    74d3cf35005cd2a81325d3d155e92c8fd6c25d1d

  • SHA256

    c53f533971e0a6e3793507bb50939a0a84ea1d55683cb69cbd4d49f58053ce01

  • SHA512

    0c6b6a7c35ab8ef702c843e1b6fc107f926e664fdd26093dc336053fd4bebe895e87a774858b1c4a33bbcceafaf7641ac2c45f3bae4a77b2e2b299216ad3c827

  • SSDEEP

    12288:qFuqfNtH7gLxSgx0YdcIT2WvZE5wggOcreRBmNADbO:MuqfNtH7o5x0Yly5wggOtEUbO

Malware Config

Extracted

Family

redline

Botnet

dast

C2

83.97.73.129:19068

Attributes
  • auth_value

    17d71bf1a3f93284f5848e00b0dd8222

Extracted

Family

amadey

Version

3.83

C2

77.91.68.30/music/rock/index.php

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Extracted

Family

redline

Botnet

dare

C2

83.97.73.129:19068

Attributes
  • auth_value

    cdee8b76b5a70827d5d5e110218c7d2f

Extracted

Family

redline

Botnet

droid

C2

83.97.73.129:19068

Attributes
  • auth_value

    4e534d26d67e90669e9843dbbfac4c52

Targets

    • Target

      ca447331085e7af73e68978ee559f0ed7f9559d96ea3a70513550768144d0818.exe

    • Size

      578KB

    • MD5

      2d624c7f085397f0872e01bdf813bdc4

    • SHA1

      6d52e786b02aea507f4f17427b62a232a3ab46d0

    • SHA256

      ca447331085e7af73e68978ee559f0ed7f9559d96ea3a70513550768144d0818

    • SHA512

      17834ef59310027992002efc7bfd382b45c74e062ef721d39907f01c3a1c40b649217db76573b912755e037289820455fd47a5ccd6bb64bc520dbc3f60146bba

    • SSDEEP

      12288:7MrOy90keOMcK7P4y3Us2Zox7gQd8cYCtlM4GBrD:pyZIrdUnFQSjCDM4krD

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks