General

  • Target

    77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a

  • Size

    995KB

  • Sample

    231001-msf7rsbe76

  • MD5

    52e90b5568839f9260a816a61af53297

  • SHA1

    ede120f88ffda599a9a61f1ea9382f8cdd7dc699

  • SHA256

    77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a

  • SHA512

    3d4fb676b1b540d09c10b03f6104a4594c0fbea2856fe0ad3c04203fe94097be974ecef29c897d2de540e2d2c97e460f327121a2e6a11557446c7a8d93602423

  • SSDEEP

    24576:CyzyVSIEec3O0LGEwES4bY9REFWoqk6mbG5u9JT2:pz+E6ERS4bYgEoqwKu9

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain
rc4.plain

Targets

    • Target

      77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a

    • Size

      995KB

    • MD5

      52e90b5568839f9260a816a61af53297

    • SHA1

      ede120f88ffda599a9a61f1ea9382f8cdd7dc699

    • SHA256

      77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a

    • SHA512

      3d4fb676b1b540d09c10b03f6104a4594c0fbea2856fe0ad3c04203fe94097be974ecef29c897d2de540e2d2c97e460f327121a2e6a11557446c7a8d93602423

    • SSDEEP

      24576:CyzyVSIEec3O0LGEwES4bY9REFWoqk6mbG5u9JT2:pz+E6ERS4bYgEoqwKu9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks