General

  • Target

    6b1acab438d06eed4aa50064a6f4e8240565f2bad0080dabbc0677009d97989c

  • Size

    678KB

  • Sample

    230622-s2kjfafb58

  • MD5

    70fe1ce85d516da3fc7097ca2a650aa0

  • SHA1

    f27021eaa00e036c936175373a87557cdf58c00d

  • SHA256

    6b1acab438d06eed4aa50064a6f4e8240565f2bad0080dabbc0677009d97989c

  • SHA512

    1ee957b42515923db8f02fa9b0af7137f742103b806da25f6db882635efb29e08a1f0fe492766b8517d4a3bff649504352565336429323459a5570290e48cf7b

  • SSDEEP

    12288:TjztKe5jWeeIO5EgIWJSn/ntGPGNaianGg6Y35Wnxy1RoPRKTh/GvIu:nk9ee8n/tUG56pr5Wy16ktzu

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Targets

    • Target

      6b1acab438d06eed4aa50064a6f4e8240565f2bad0080dabbc0677009d97989c

    • Size

      678KB

    • MD5

      70fe1ce85d516da3fc7097ca2a650aa0

    • SHA1

      f27021eaa00e036c936175373a87557cdf58c00d

    • SHA256

      6b1acab438d06eed4aa50064a6f4e8240565f2bad0080dabbc0677009d97989c

    • SHA512

      1ee957b42515923db8f02fa9b0af7137f742103b806da25f6db882635efb29e08a1f0fe492766b8517d4a3bff649504352565336429323459a5570290e48cf7b

    • SSDEEP

      12288:TjztKe5jWeeIO5EgIWJSn/ntGPGNaianGg6Y35Wnxy1RoPRKTh/GvIu:nk9ee8n/tUG56pr5Wy16ktzu

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks