General

  • Target

    728dcd88ed85d90c348326fc4.exe

  • Size

    558KB

  • Sample

    230630-n5x7gshf55

  • MD5

    5ac1e66eaf29ade5738b7a4aac5992ed

  • SHA1

    dbfb23455f027ee6681e26b8f74ae1f1503e6cf0

  • SHA256

    728dcd88ed85d90c348326fc41ab2186b51d34f2f96fd86a33a619a8d54b82a8

  • SHA512

    664a4ce0744f9e7ebbb67f5b5f77befcb477ef786575343fc8179fa4f38c4e5467c2847254d2477a36fa8364a632ddabfb304dde92e80ebad3f50472c1aa73f6

  • SSDEEP

    12288:ECjT7FMAR6tnIJUmj80qDWvb/66APb4ihJaWG0jMS9Xi:EGMQSn2UmQ0qDWvbqPCWG0jfBi

Malware Config

Extracted

Family

redline

Botnet

smoke

C2

83.97.73.131:19071

Attributes
  • auth_value

    aaa47198b84c95fcce9397339e8af9d4

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Targets

    • Target

      728dcd88ed85d90c348326fc4.exe

    • Size

      558KB

    • MD5

      5ac1e66eaf29ade5738b7a4aac5992ed

    • SHA1

      dbfb23455f027ee6681e26b8f74ae1f1503e6cf0

    • SHA256

      728dcd88ed85d90c348326fc41ab2186b51d34f2f96fd86a33a619a8d54b82a8

    • SHA512

      664a4ce0744f9e7ebbb67f5b5f77befcb477ef786575343fc8179fa4f38c4e5467c2847254d2477a36fa8364a632ddabfb304dde92e80ebad3f50472c1aa73f6

    • SSDEEP

      12288:ECjT7FMAR6tnIJUmj80qDWvb/66APb4ihJaWG0jMS9Xi:EGMQSn2UmQ0qDWvbqPCWG0jfBi

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks