General

  • Target

    dc2ff620fafd575e877ceec0255f4e45c0a42262494cf828cfd95b9b03388a31

  • Size

    1.5MB

  • Sample

    231004-m1636ach89

  • MD5

    93c3b713ad6bfd5a05f0b50f9c23f335

  • SHA1

    fa3fbbe74c03125a2201f797e03df28d6a26dbda

  • SHA256

    eee76c8cc64059214efefbe5a50065cbc3a098ba56a5ae47d5290e5cd8fbda58

  • SHA512

    b8fa28cd72a5b484b05caacec8fd895e141a457c121dd054e4f578400aacc28f293bf5ca154afc36c4f381bea7b3f6e4a76afb8056b8dc0576d67e39a6f4022a

  • SSDEEP

    24576:93FyWessg3Ygrb0SNSRSPtieEhplS/mocE15hKoP6uQgbvK21vFu8Zfas2/23EaO:93gksg/v0vw1iFfGn6u7bvK21v48Zfa3

Malware Config

Extracted

Family

redline

Botnet

frant

C2

77.91.124.55:19071

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain
rc4.plain

Targets

    • Target

      dc2ff620fafd575e877ceec0255f4e45c0a42262494cf828cfd95b9b03388a31

    • Size

      1.5MB

    • MD5

      5f9e63419467b981b72d4f9adbe67d22

    • SHA1

      420ec23d6870b000adc0eeeb60868a9cf7383e8f

    • SHA256

      dc2ff620fafd575e877ceec0255f4e45c0a42262494cf828cfd95b9b03388a31

    • SHA512

      1c633bd4f637d5eaa27c003b9565ef85a32009c40e2c33c2f6e01be35ecd3ce14520e3ac230c787fc39cbdf148b09b34f74b890c3f45593acee72a7c624c6140

    • SSDEEP

      49152:1Ls/ZE3GjEnAXnG7fkG7NvK41vG8ZfEnf:da23GjEnAXtGQOOvf

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks