General

  • Target

    119bde3ed26b9dd06bd186179a447089d8ea791308c83f63b50a7b5d73e8f5de

  • Size

    801KB

  • Sample

    230616-lbzgcadh51

  • MD5

    879c705fc222f4babae507e601a3a11c

  • SHA1

    899c94ffe2e955897c72d70714013568c6bae898

  • SHA256

    119bde3ed26b9dd06bd186179a447089d8ea791308c83f63b50a7b5d73e8f5de

  • SHA512

    3398b9dcf98bc5d1916e12a0cc8487f0996ffc0cd395e0941e4507b1672d95899f2860109f99a3d48d0668881308fef8c90299c763c796cc3d4ec2174f4097d4

  • SSDEEP

    24576:oy3+c+wfhGGJBpw5J9cgn/6UqvzVKoqj:vOHwfhGGJBu9c6/OzEo

Malware Config

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Extracted

Family

redline

Botnet

mana

C2

83.97.73.130:19061

Attributes
  • auth_value

    4f5139d6c845fe72d05faf05763b6c31

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Targets

    • Target

      119bde3ed26b9dd06bd186179a447089d8ea791308c83f63b50a7b5d73e8f5de

    • Size

      801KB

    • MD5

      879c705fc222f4babae507e601a3a11c

    • SHA1

      899c94ffe2e955897c72d70714013568c6bae898

    • SHA256

      119bde3ed26b9dd06bd186179a447089d8ea791308c83f63b50a7b5d73e8f5de

    • SHA512

      3398b9dcf98bc5d1916e12a0cc8487f0996ffc0cd395e0941e4507b1672d95899f2860109f99a3d48d0668881308fef8c90299c763c796cc3d4ec2174f4097d4

    • SSDEEP

      24576:oy3+c+wfhGGJBpw5J9cgn/6UqvzVKoqj:vOHwfhGGJBu9c6/OzEo

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks