General

  • Target

    50d39d82092fae0e8fec85dce0a114ccfdefc1e18bc86.exe

  • Size

    523KB

  • Sample

    230707-hkrw3sgg4x

  • MD5

    31c557746c8cab0485d45984a87df60a

  • SHA1

    8460bbf2b91f0d8a7c16bc26622277552fcd6020

  • SHA256

    50d39d82092fae0e8fec85dce0a114ccfdefc1e18bc86ca158e3574c86027e62

  • SHA512

    64f1d6337d6f29dbb5bfedefae93a98b407ed201b6eb526837155434f858c096dcb6cade7ac75c4bc7c2dcfbf6f38dfc86a592354a91ca12170c2bfc4225da2f

  • SSDEEP

    12288:NXpRfvSaRdnQgSrNACrKhL7kHfx2i6t8J/o+O8Eesa:NXpdvS82giNde9sL6tA/TVzT

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Targets

    • Target

      50d39d82092fae0e8fec85dce0a114ccfdefc1e18bc86.exe

    • Size

      523KB

    • MD5

      31c557746c8cab0485d45984a87df60a

    • SHA1

      8460bbf2b91f0d8a7c16bc26622277552fcd6020

    • SHA256

      50d39d82092fae0e8fec85dce0a114ccfdefc1e18bc86ca158e3574c86027e62

    • SHA512

      64f1d6337d6f29dbb5bfedefae93a98b407ed201b6eb526837155434f858c096dcb6cade7ac75c4bc7c2dcfbf6f38dfc86a592354a91ca12170c2bfc4225da2f

    • SSDEEP

      12288:NXpRfvSaRdnQgSrNACrKhL7kHfx2i6t8J/o+O8Eesa:NXpdvS82giNde9sL6tA/TVzT

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks