General

  • Target

    62015449a3dfe2361786010638e81bd324a3e74e8c0a6a05bdb251cff751ce0c

  • Size

    713KB

  • Sample

    230622-ns13lseb53

  • MD5

    404ffa22d1b763309c705b91250f7e87

  • SHA1

    e35b0c217ec778ab2845824e77a54fa3ebd75877

  • SHA256

    62015449a3dfe2361786010638e81bd324a3e74e8c0a6a05bdb251cff751ce0c

  • SHA512

    6a9ddf1ba375e628ca06bbe87fe2047da70ca699c31ea01b1c675a75282d5f8b26079ff57b456f1aba499001725415eacba9575af0d46011037aeaf0500f6439

  • SSDEEP

    12288:YztKeujWeeIOFAeaWJSn/1NsxmHmMle+d13DN1x7vhDQpUiTrR:Yk8eeUn/vHTeQ9DTx7duUA

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Targets

    • Target

      62015449a3dfe2361786010638e81bd324a3e74e8c0a6a05bdb251cff751ce0c

    • Size

      713KB

    • MD5

      404ffa22d1b763309c705b91250f7e87

    • SHA1

      e35b0c217ec778ab2845824e77a54fa3ebd75877

    • SHA256

      62015449a3dfe2361786010638e81bd324a3e74e8c0a6a05bdb251cff751ce0c

    • SHA512

      6a9ddf1ba375e628ca06bbe87fe2047da70ca699c31ea01b1c675a75282d5f8b26079ff57b456f1aba499001725415eacba9575af0d46011037aeaf0500f6439

    • SSDEEP

      12288:YztKeujWeeIOFAeaWJSn/1NsxmHmMle+d13DN1x7vhDQpUiTrR:Yk8eeUn/vHTeQ9DTx7duUA

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks