General

  • Target

    t5489145.exe

  • Size

    314KB

  • Sample

    230825-e8ysrahb73

  • MD5

    5ebd49060b21946157c3340c680769d0

  • SHA1

    435b9e144da84d8ffa40b490d081e1d20947ee0b

  • SHA256

    b78d7453f75227abb897a3a573f08063b67661903605012881543f5abfd434c8

  • SHA512

    5b98f18c04011befd89dd2c24d3796eb010e789f72e20d651efdeaef03d9150bd4196bad70f359561bc9e58a22e07d712814e8ba2a5392e5ceab85c95d614015

  • SSDEEP

    6144:zR/tsQnf6X0M6+koYhXMxjwigfwfgbePu97rrAOQ322222KTq:zRlHVckoaXMxcePu97Hg22222iq

Malware Config

Extracted

Family

amadey

Version

3.87

C2

193.233.255.9/nasa/index.php

Extracted

Family

redline

Botnet

metafile

C2

91.103.252.39:7899

Attributes
  • auth_value

    9ac6dc6d653e5268fd38b21a0ec2b458

Extracted

Family

amadey

Version

3.83

C2

5.42.65.80/8bmeVwqx/index.php

Targets

    • Target

      t5489145.exe

    • Size

      314KB

    • MD5

      5ebd49060b21946157c3340c680769d0

    • SHA1

      435b9e144da84d8ffa40b490d081e1d20947ee0b

    • SHA256

      b78d7453f75227abb897a3a573f08063b67661903605012881543f5abfd434c8

    • SHA512

      5b98f18c04011befd89dd2c24d3796eb010e789f72e20d651efdeaef03d9150bd4196bad70f359561bc9e58a22e07d712814e8ba2a5392e5ceab85c95d614015

    • SSDEEP

      6144:zR/tsQnf6X0M6+koYhXMxjwigfwfgbePu97rrAOQ322222KTq:zRlHVckoaXMxcePu97Hg22222iq

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks