General

  • Target

    cdb902807aa4ee9c4777184062e11342.exe

  • Size

    3.6MB

  • Sample

    230706-gysvvshb52

  • MD5

    cdb902807aa4ee9c4777184062e11342

  • SHA1

    dbb2eb7ba496f70e82cff2211d02fe47a5da865a

  • SHA256

    2a0532009b3e0e78531711b3d2d775bbb83700179dcb1756d0b03938fb1ea7d8

  • SHA512

    823f6174a1c037681f35d8f86342b220c82e1bb4f1f36ee92ad41d9b8b8d0ece0baecc168e241b7d726b12dc73ff22908dd835419dcad9509d4f72923657c7b7

  • SSDEEP

    49152:cHGFL5UbuCUmq/TJDVOVhbN5T5PwoBmHQmU2rTYDTRpnXqDhdfKKgyyWgozrOI82:tyoIhmHIDgZKWrfpbZ9

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Targets

    • Target

      cdb902807aa4ee9c4777184062e11342.exe

    • Size

      3.6MB

    • MD5

      cdb902807aa4ee9c4777184062e11342

    • SHA1

      dbb2eb7ba496f70e82cff2211d02fe47a5da865a

    • SHA256

      2a0532009b3e0e78531711b3d2d775bbb83700179dcb1756d0b03938fb1ea7d8

    • SHA512

      823f6174a1c037681f35d8f86342b220c82e1bb4f1f36ee92ad41d9b8b8d0ece0baecc168e241b7d726b12dc73ff22908dd835419dcad9509d4f72923657c7b7

    • SSDEEP

      49152:cHGFL5UbuCUmq/TJDVOVhbN5T5PwoBmHQmU2rTYDTRpnXqDhdfKKgyyWgozrOI82:tyoIhmHIDgZKWrfpbZ9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks