General

  • Target

    54110f38bcdd48a812ee858efdc3d1db1c2ba162c1cc6f6d533a39dc2eea936f

  • Size

    1.0MB

  • Sample

    230904-c2w98sdg94

  • MD5

    0446680aaad5c87c2f4dfc95accd280f

  • SHA1

    a12637ea126becf6e989775b522eea6166be3968

  • SHA256

    54110f38bcdd48a812ee858efdc3d1db1c2ba162c1cc6f6d533a39dc2eea936f

  • SHA512

    cbb719c814185b2488edcb55b2a2f8064ebd51c05d52a1138e4fe6ce9eeaecd9660c9c08f1394597cc7b2062d206400d04df86398620a75dc89453e564139ab3

  • SSDEEP

    24576:wymOAy+hOTz3qiYn35+mFqnoGrctwmtdjp3BkKzD6:3mOE4TCnJ+aqrcrjpK

Malware Config

Extracted

Family

amadey

Version

3.87

C2

77.91.68.18/nice/index.php

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

rc4.plain

Extracted

Family

redline

Botnet

gena

C2

77.91.124.82:19071

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Targets

    • Target

      54110f38bcdd48a812ee858efdc3d1db1c2ba162c1cc6f6d533a39dc2eea936f

    • Size

      1.0MB

    • MD5

      0446680aaad5c87c2f4dfc95accd280f

    • SHA1

      a12637ea126becf6e989775b522eea6166be3968

    • SHA256

      54110f38bcdd48a812ee858efdc3d1db1c2ba162c1cc6f6d533a39dc2eea936f

    • SHA512

      cbb719c814185b2488edcb55b2a2f8064ebd51c05d52a1138e4fe6ce9eeaecd9660c9c08f1394597cc7b2062d206400d04df86398620a75dc89453e564139ab3

    • SSDEEP

      24576:wymOAy+hOTz3qiYn35+mFqnoGrctwmtdjp3BkKzD6:3mOE4TCnJ+aqrcrjpK

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks