General

  • Target

    4ab28a84b438dfeeffef8481c849ed4d7ce0f5bc94e4f0c467aa9469e28ca859

  • Size

    583KB

  • Sample

    230617-dyjemshf9t

  • MD5

    422419c327691cff180055bf4c0c6f36

  • SHA1

    0ce358f262f16ab03cf4bb08bc550184e611b8fa

  • SHA256

    4ab28a84b438dfeeffef8481c849ed4d7ce0f5bc94e4f0c467aa9469e28ca859

  • SHA512

    7f4c491a71227be6aae84e7e971eaaa2a6bfbd3e570a907f5f941a5f0781875f7827a4e4b65bfcc445aef0e4220875564de927f34cfa592a744b6a8276236d7e

  • SSDEEP

    12288:mMr8y90RcoNw/Y62TTupfLrcLWLhrcKTn0Tby9AUN0iEdFt:Oymco0Yp3uYENnTn0C0iC

Malware Config

Extracted

Family

redline

Botnet

dedo

C2

83.97.73.130:19061

Attributes
  • auth_value

    ac76f7438fbe49011f900c651cb85e26

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

redline

Botnet

grega

C2

83.97.73.130:19061

Attributes
  • auth_value

    16e2fbc2847b2270b3f0679e2dd76c8d

Targets

    • Target

      4ab28a84b438dfeeffef8481c849ed4d7ce0f5bc94e4f0c467aa9469e28ca859

    • Size

      583KB

    • MD5

      422419c327691cff180055bf4c0c6f36

    • SHA1

      0ce358f262f16ab03cf4bb08bc550184e611b8fa

    • SHA256

      4ab28a84b438dfeeffef8481c849ed4d7ce0f5bc94e4f0c467aa9469e28ca859

    • SHA512

      7f4c491a71227be6aae84e7e971eaaa2a6bfbd3e570a907f5f941a5f0781875f7827a4e4b65bfcc445aef0e4220875564de927f34cfa592a744b6a8276236d7e

    • SSDEEP

      12288:mMr8y90RcoNw/Y62TTupfLrcLWLhrcKTn0Tby9AUN0iEdFt:Oymco0Yp3uYENnTn0C0iC

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks