General

  • Target

    392f3d2260833e3e2575550a9de12606.exe

  • Size

    691KB

  • Sample

    230702-p8metsbf55

  • MD5

    392f3d2260833e3e2575550a9de12606

  • SHA1

    2a79b045eaf9e49642ae8eacd9991e926290620f

  • SHA256

    83568a8dafd7d24fa7e7354ebcf0454600bc5bc6b6eae8343e4d3dd283378091

  • SHA512

    1dfd659f3a2d4320a22a1d051bc8073bd20a4d685c551dceb2ff7f40de377d30984a74a47b7206cc4ad769860e5a8f3c7cfe0e991b55289105fae4abd070221e

  • SSDEEP

    12288:QuGr0TvQ2PBsv3o0wpeccdRWcrY7eqD0bxvcmmqGkCz7:Qzr0Tx6nglcrS90bxcTj

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Extracted

Family

amadey

Version

3.81

C2

95.214.27.98/cronus/index.php

Extracted

Family

redline

Botnet

newdomenbuil

C2

urelishavea.online:80

Attributes
  • auth_value

    3f57eb8802ec1ee7acaa6e6da0537c27

Targets

    • Target

      392f3d2260833e3e2575550a9de12606.exe

    • Size

      691KB

    • MD5

      392f3d2260833e3e2575550a9de12606

    • SHA1

      2a79b045eaf9e49642ae8eacd9991e926290620f

    • SHA256

      83568a8dafd7d24fa7e7354ebcf0454600bc5bc6b6eae8343e4d3dd283378091

    • SHA512

      1dfd659f3a2d4320a22a1d051bc8073bd20a4d685c551dceb2ff7f40de377d30984a74a47b7206cc4ad769860e5a8f3c7cfe0e991b55289105fae4abd070221e

    • SSDEEP

      12288:QuGr0TvQ2PBsv3o0wpeccdRWcrY7eqD0bxvcmmqGkCz7:Qzr0Tx6nglcrS90bxcTj

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks