General

  • Target

    42fb96687fd3384cdb316865dfdfcbed.exe

  • Size

    750KB

  • Sample

    230614-q6d64shg36

  • MD5

    42fb96687fd3384cdb316865dfdfcbed

  • SHA1

    85ba5861a5c512ab82f7a772b9eac5f0ad4ea409

  • SHA256

    a0eea7a33131a9f834f89f355ca8f56b53a6586e514f5aac1925fe3025f074aa

  • SHA512

    3ab5692e597a8f40f37112a050aa45af345a1201cc78cf845788d5af5bec3fb8b091145a80910ae305cd5bc7bd24b9f5152778da5596575884a71e6db1d12998

  • SSDEEP

    12288:3Mrny90LK35Lup+gnjDbk/dtoGeiTdypuv+jMIgyNlpPAhu9Rx/b5Va9zAR9Q8XM:kyKKJLcXvbTAYM9y9IhiRY9qf58NuFpQ

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.130:19061

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Targets

    • Target

      42fb96687fd3384cdb316865dfdfcbed.exe

    • Size

      750KB

    • MD5

      42fb96687fd3384cdb316865dfdfcbed

    • SHA1

      85ba5861a5c512ab82f7a772b9eac5f0ad4ea409

    • SHA256

      a0eea7a33131a9f834f89f355ca8f56b53a6586e514f5aac1925fe3025f074aa

    • SHA512

      3ab5692e597a8f40f37112a050aa45af345a1201cc78cf845788d5af5bec3fb8b091145a80910ae305cd5bc7bd24b9f5152778da5596575884a71e6db1d12998

    • SSDEEP

      12288:3Mrny90LK35Lup+gnjDbk/dtoGeiTdypuv+jMIgyNlpPAhu9Rx/b5Va9zAR9Q8XM:kyKKJLcXvbTAYM9y9IhiRY9qf58NuFpQ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks