General

  • Target

    965b6d313731cc1c3813f38bdd03b6c2.exe

  • Size

    576KB

  • Sample

    230615-gakjkseg6v

  • MD5

    965b6d313731cc1c3813f38bdd03b6c2

  • SHA1

    185dd85e35c40df9ac47aeb91a45895b03b0875f

  • SHA256

    a29f389afd698345bb02d13be4e004d716ab077aefa94191f01411312d67378b

  • SHA512

    1f214302f814aec4845c089ee0c78bdfeb46c9301f27edab649308130910150c43e5ea98c032e6e475e45e41514d10be4a503475d371846919fe5ffc0b567377

  • SSDEEP

    12288:3MrEy901qugMfFK2K/b0p+SycVOFKDERSPHklab2/9W4Dtiq5AZ+cHDwo:PyMpFKapRQo4SPbbq9WIihVDwo

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.130:19061

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Targets

    • Target

      965b6d313731cc1c3813f38bdd03b6c2.exe

    • Size

      576KB

    • MD5

      965b6d313731cc1c3813f38bdd03b6c2

    • SHA1

      185dd85e35c40df9ac47aeb91a45895b03b0875f

    • SHA256

      a29f389afd698345bb02d13be4e004d716ab077aefa94191f01411312d67378b

    • SHA512

      1f214302f814aec4845c089ee0c78bdfeb46c9301f27edab649308130910150c43e5ea98c032e6e475e45e41514d10be4a503475d371846919fe5ffc0b567377

    • SSDEEP

      12288:3MrEy901qugMfFK2K/b0p+SycVOFKDERSPHklab2/9W4Dtiq5AZ+cHDwo:PyMpFKapRQo4SPbbq9WIihVDwo

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks