General

  • Target

    3bd2f857a4797f0337a6e5d955b44d7c84311968e1ce8bb2868287a30fded455

  • Size

    513KB

  • Sample

    230703-et1zkafh2y

  • MD5

    fd36649fa7fc6229ca95b43e33a10b5c

  • SHA1

    c4efa207ee408bef3d655f73fb517f9abd33b74a

  • SHA256

    3bd2f857a4797f0337a6e5d955b44d7c84311968e1ce8bb2868287a30fded455

  • SHA512

    2a2ffdbefef57989873de151568397fcf5bc522b6075d0e7268ed51447b03c6177765a369e6b6fb23cb980e2cfc535a322ba95dd08b292b760b1471b43f93fc3

  • SSDEEP

    6144:+aWV6ToTLmBpOY5P3m88BtK3wxY90qziD8DrJmPeh6xKU7TMChW8ep/MPaWuJEmh:g6THSQ2PBs50CoP+uKE1X1USmD4i3QSd

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Targets

    • Target

      3bd2f857a4797f0337a6e5d955b44d7c84311968e1ce8bb2868287a30fded455

    • Size

      513KB

    • MD5

      fd36649fa7fc6229ca95b43e33a10b5c

    • SHA1

      c4efa207ee408bef3d655f73fb517f9abd33b74a

    • SHA256

      3bd2f857a4797f0337a6e5d955b44d7c84311968e1ce8bb2868287a30fded455

    • SHA512

      2a2ffdbefef57989873de151568397fcf5bc522b6075d0e7268ed51447b03c6177765a369e6b6fb23cb980e2cfc535a322ba95dd08b292b760b1471b43f93fc3

    • SSDEEP

      6144:+aWV6ToTLmBpOY5P3m88BtK3wxY90qziD8DrJmPeh6xKU7TMChW8ep/MPaWuJEmh:g6THSQ2PBs50CoP+uKE1X1USmD4i3QSd

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks