General

  • Target

    0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769a.exe

  • Size

    3.6MB

  • Sample

    230706-mfylaaaa35

  • MD5

    3a6cfe8e7653ce410d2fc055238dcc23

  • SHA1

    3a4ae20d099c82d8aaa8d1e525bc044e48bed395

  • SHA256

    0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769aa3df6d16ef17574f4bd

  • SHA512

    7b30197521e8311ad6b2769a0d1cb9c8d4b73424512e3c64661c185882bc39e03cb63a228f84f94ddfbb8fb9b22f5191d199f6b6eb2f1309d500a1d7fdacad6b

  • SSDEEP

    49152:difqy3vEO+bJa+tJ9KReTkomjxefV5ddUiyy5X7tB3bTpuL3yMcSt55IcxNr2L10:PyfFzohdFRLzX01ph

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Extracted

Family

amadey

Version

3.84

C2

77.91.68.63/doma/net/index.php

Targets

    • Target

      0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769a.exe

    • Size

      3.6MB

    • MD5

      3a6cfe8e7653ce410d2fc055238dcc23

    • SHA1

      3a4ae20d099c82d8aaa8d1e525bc044e48bed395

    • SHA256

      0e7c8949d1c4baab0bb02d727f8f1ef88db1d81ef769aa3df6d16ef17574f4bd

    • SHA512

      7b30197521e8311ad6b2769a0d1cb9c8d4b73424512e3c64661c185882bc39e03cb63a228f84f94ddfbb8fb9b22f5191d199f6b6eb2f1309d500a1d7fdacad6b

    • SSDEEP

      49152:difqy3vEO+bJa+tJ9KReTkomjxefV5ddUiyy5X7tB3bTpuL3yMcSt55IcxNr2L10:PyfFzohdFRLzX01ph

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks