General

  • Target

    943aa34914154c4ead0fdca7c1315512.exe

  • Size

    518KB

  • Sample

    230707-km8zgsha8w

  • MD5

    943aa34914154c4ead0fdca7c1315512

  • SHA1

    cccd8929c3dff9343037efc4c61dff368f291836

  • SHA256

    cce421005e10444fd442c576f197545e092c3d8ca6635dff082f51b43893f9cc

  • SHA512

    35d2d9295285bc91343ddfc388da57dce823ea4605e2e46122ee52496939fb6e00a8a85115cccad17d1913dcffcc6520f32259be592ae99dbaf3389d533b5fd9

  • SSDEEP

    12288:bpk+FSfviaRdnQgHmdR2HU5fOOUv2v+G8iz:bpk+Gvi82gRGmOU2v/L

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Targets

    • Target

      943aa34914154c4ead0fdca7c1315512.exe

    • Size

      518KB

    • MD5

      943aa34914154c4ead0fdca7c1315512

    • SHA1

      cccd8929c3dff9343037efc4c61dff368f291836

    • SHA256

      cce421005e10444fd442c576f197545e092c3d8ca6635dff082f51b43893f9cc

    • SHA512

      35d2d9295285bc91343ddfc388da57dce823ea4605e2e46122ee52496939fb6e00a8a85115cccad17d1913dcffcc6520f32259be592ae99dbaf3389d533b5fd9

    • SSDEEP

      12288:bpk+FSfviaRdnQgHmdR2HU5fOOUv2v+G8iz:bpk+Gvi82gRGmOU2v/L

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks