General

  • Target

    6ca681d3aa6bd3eb67bc6fa97636220458e8b2610a1b0e30b30ef1f7677e83aa

  • Size

    515KB

  • Sample

    230719-l5cvfacd93

  • MD5

    20a45a19f4f529e40893ad3d5e2b5a0b

  • SHA1

    cd2af898a16c46ac60d1d76b6b2274d4c5c45d53

  • SHA256

    6ca681d3aa6bd3eb67bc6fa97636220458e8b2610a1b0e30b30ef1f7677e83aa

  • SHA512

    cb830c544288480e353f6eac8fa120b1b1f8abfe5e624cc38f3dd6d39bb764216ca89658ae23203fe41a76997dc2ece7806f2e2c7c8c4f52ade55cc5d4da05d6

  • SSDEEP

    6144:K+y+bnr+Ip0yN90QE51vAB7pvJ/WohorXEgxbE33mZsd78EfGtwfPu/28XNd+rCb:OMrky90lYQohWjxW2Q8EfYogV7AVu

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Targets

    • Target

      6ca681d3aa6bd3eb67bc6fa97636220458e8b2610a1b0e30b30ef1f7677e83aa

    • Size

      515KB

    • MD5

      20a45a19f4f529e40893ad3d5e2b5a0b

    • SHA1

      cd2af898a16c46ac60d1d76b6b2274d4c5c45d53

    • SHA256

      6ca681d3aa6bd3eb67bc6fa97636220458e8b2610a1b0e30b30ef1f7677e83aa

    • SHA512

      cb830c544288480e353f6eac8fa120b1b1f8abfe5e624cc38f3dd6d39bb764216ca89658ae23203fe41a76997dc2ece7806f2e2c7c8c4f52ade55cc5d4da05d6

    • SSDEEP

      6144:K+y+bnr+Ip0yN90QE51vAB7pvJ/WohorXEgxbE33mZsd78EfGtwfPu/28XNd+rCb:OMrky90lYQohWjxW2Q8EfYogV7AVu

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks