General

  • Target

    794302ef710e6a473d622095902eb8b66f30ddaa11b0ac92d9d4743f95a69a08

  • Size

    1.0MB

  • Sample

    231010-1kk3msfb79

  • MD5

    bafd28d6efe13a239a0e7d4471c4db90

  • SHA1

    17cb9dfd3e08b355d7b4b112f5eea6347a0180ce

  • SHA256

    794302ef710e6a473d622095902eb8b66f30ddaa11b0ac92d9d4743f95a69a08

  • SHA512

    a0c394b68eecc5722c953bf3cf76eb15611cfeb7248c4645f9eec6831a9be94e58fd7a03265b73d410e5975f0014e1045f795d3582eaaea4a137242a097502d6

  • SSDEEP

    24576:QymV07LdQf+ity1KQ/b7Ht8d4pFxCsrFftl3RxiRdDtzw+34d:XFdG0V84NrFDRw7D91o

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain
rc4.plain

Targets

    • Target

      794302ef710e6a473d622095902eb8b66f30ddaa11b0ac92d9d4743f95a69a08

    • Size

      1.0MB

    • MD5

      bafd28d6efe13a239a0e7d4471c4db90

    • SHA1

      17cb9dfd3e08b355d7b4b112f5eea6347a0180ce

    • SHA256

      794302ef710e6a473d622095902eb8b66f30ddaa11b0ac92d9d4743f95a69a08

    • SHA512

      a0c394b68eecc5722c953bf3cf76eb15611cfeb7248c4645f9eec6831a9be94e58fd7a03265b73d410e5975f0014e1045f795d3582eaaea4a137242a097502d6

    • SSDEEP

      24576:QymV07LdQf+ity1KQ/b7Ht8d4pFxCsrFftl3RxiRdDtzw+34d:XFdG0V84NrFDRw7D91o

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks