General

  • Target

    16d58fafa628d87e2f7e256265e11dab94bec296f3d2bb0f29669db77aee77d6

  • Size

    514KB

  • Sample

    230722-rj1l9sbe8v

  • MD5

    ed7b9198c1233e4151d7222a80854a26

  • SHA1

    d3a0bc67f6e3abf1304a4334567b8c098d065806

  • SHA256

    16d58fafa628d87e2f7e256265e11dab94bec296f3d2bb0f29669db77aee77d6

  • SHA512

    e921a88f62157c0bfeeffa64f83571cba390e825510c756d3bec6ece0f2e91faeda705685d8750a1bdda519867f0cd40a392ed63765df32371cf07cda0f1c7a2

  • SSDEEP

    6144:KKy+bnr+qp0yN90QEdvrIkr2oXnePRjZH5LPFepaV5gzRmN1dmB+2Cpv991Joot4:eMrSy903IUKZVwcMRmZN99Po0hJSf1

Malware Config

Extracted

Family

amadey

Version

3.85

C2

77.91.68.3/home/love/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grom

C2

77.91.68.68:19071

Attributes
  • auth_value

    9ec3129bff410b89097d656d7abc33dc

Targets

    • Target

      16d58fafa628d87e2f7e256265e11dab94bec296f3d2bb0f29669db77aee77d6

    • Size

      514KB

    • MD5

      ed7b9198c1233e4151d7222a80854a26

    • SHA1

      d3a0bc67f6e3abf1304a4334567b8c098d065806

    • SHA256

      16d58fafa628d87e2f7e256265e11dab94bec296f3d2bb0f29669db77aee77d6

    • SHA512

      e921a88f62157c0bfeeffa64f83571cba390e825510c756d3bec6ece0f2e91faeda705685d8750a1bdda519867f0cd40a392ed63765df32371cf07cda0f1c7a2

    • SSDEEP

      6144:KKy+bnr+qp0yN90QEdvrIkr2oXnePRjZH5LPFepaV5gzRmN1dmB+2Cpv991Joot4:eMrSy903IUKZVwcMRmZN99Po0hJSf1

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks