General

  • Target

    e56c948109c9c5812c681365f80db8e9.exe

  • Size

    706KB

  • Sample

    230702-cxz6bsbe5t

  • MD5

    e56c948109c9c5812c681365f80db8e9

  • SHA1

    8345c476b1b7f22860a01a65f5fdaca9acb373a8

  • SHA256

    73bb4d8a06bfd09efea5d6c0a9dae34cb796e61114589097e7ba7bace5cdb43d

  • SHA512

    a2682ea264ade51249f7fa1794cbf8f357ea81a1971dc63e9399b9ddb38a8759189b5829efb6a948bf65eabf44b59f148d90d555cbdc0caddcfb6ab36fed03d7

  • SSDEEP

    12288:2/cH/Q2PBskm/AeeyYOVWHBvllZUyEdN9TB7RHLbYEy/4gMQdQZ:2/cHBpm/FSHpBg7lL8Ey/u

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Extracted

Family

amadey

Version

3.81

C2

95.214.27.98/cronus/index.php

Extracted

Family

redline

Botnet

@rocketprosupport1

C2

104.211.55.2:80

Attributes
  • auth_value

    d3e217c2eab07f2abc41ade13a666e65

Targets

    • Target

      e56c948109c9c5812c681365f80db8e9.exe

    • Size

      706KB

    • MD5

      e56c948109c9c5812c681365f80db8e9

    • SHA1

      8345c476b1b7f22860a01a65f5fdaca9acb373a8

    • SHA256

      73bb4d8a06bfd09efea5d6c0a9dae34cb796e61114589097e7ba7bace5cdb43d

    • SHA512

      a2682ea264ade51249f7fa1794cbf8f357ea81a1971dc63e9399b9ddb38a8759189b5829efb6a948bf65eabf44b59f148d90d555cbdc0caddcfb6ab36fed03d7

    • SSDEEP

      12288:2/cH/Q2PBskm/AeeyYOVWHBvllZUyEdN9TB7RHLbYEy/4gMQdQZ:2/cHBpm/FSHpBg7lL8Ey/u

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks