General

  • Target

    14a1ddf0e2775482a8e0877b899a40af.exe

  • Size

    662KB

  • Sample

    230702-2z4nzadh52

  • MD5

    14a1ddf0e2775482a8e0877b899a40af

  • SHA1

    b7de5aeb19d91451afec09e9b6632c51055388f2

  • SHA256

    9076f5d5aa29aaa4bf6d3e47a645adb66854031c7961431bc9cb948171b04f9a

  • SHA512

    0524b84a3fed9a15d4c13c89329ec8e18611f38aafa266a4d0658fe33fc29a57295ae431212a45c93829b1082f0d2a51f51b46b3d929ea65dca019d73b4bb64e

  • SSDEEP

    12288:42B7LyKQ2PBsWCAz6jEhuS7+DVcDAnJmv82AFeh:4y7LyqgAht6DKAJynAFeh

Malware Config

Extracted

Family

redline

Botnet

novak

C2

77.91.124.49:19073

Attributes
  • auth_value

    31966dcd1c6ca86e6e8b0a259f9d8ffd

Extracted

Family

amadey

Version

3.81

C2

95.214.27.98/cronus/index.php

Extracted

Family

redline

Botnet

@rocketprosupport1

C2

104.211.55.2:80

Attributes
  • auth_value

    d3e217c2eab07f2abc41ade13a666e65

Extracted

Family

redline

Botnet

newdomenbuil

C2

urelishavea.online:80

Attributes
  • auth_value

    3f57eb8802ec1ee7acaa6e6da0537c27

Targets

    • Target

      14a1ddf0e2775482a8e0877b899a40af.exe

    • Size

      662KB

    • MD5

      14a1ddf0e2775482a8e0877b899a40af

    • SHA1

      b7de5aeb19d91451afec09e9b6632c51055388f2

    • SHA256

      9076f5d5aa29aaa4bf6d3e47a645adb66854031c7961431bc9cb948171b04f9a

    • SHA512

      0524b84a3fed9a15d4c13c89329ec8e18611f38aafa266a4d0658fe33fc29a57295ae431212a45c93829b1082f0d2a51f51b46b3d929ea65dca019d73b4bb64e

    • SSDEEP

      12288:42B7LyKQ2PBsWCAz6jEhuS7+DVcDAnJmv82AFeh:4y7LyqgAht6DKAJynAFeh

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks