General

  • Target

    b00e9bbd3ba1de3017b76d9de53f859c69c358e678b00cd4673f45997ad43ffb

  • Size

    1.1MB

  • Sample

    231011-15vsksfe5v

  • MD5

    8c07b714152db24201b88b98fa3699d3

  • SHA1

    ed604026ef8d1979c5b827c1e70197eae080e697

  • SHA256

    b00e9bbd3ba1de3017b76d9de53f859c69c358e678b00cd4673f45997ad43ffb

  • SHA512

    53f7b16311fdfe59c43c5a7da1f2a323da3b623c352b65a125d503e47e50b2b1d9dca7ea74df66881e92d3e63feb09183152617eb59674479080ca30ccf3e59d

  • SSDEEP

    24576:RyYhuLKSeflk8h3sHfDXJfUkAZ0zd2tJiDZ5Omz:EKuLPeKrH7WtZ0R2tE15O

Malware Config

Extracted

Family

redline

Botnet

nanya

C2

77.91.124.82:19071

Attributes
  • auth_value

    640aa5afe54f566d8795f0dc723f8b52

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
rc4.plain

Targets

    • Target

      b00e9bbd3ba1de3017b76d9de53f859c69c358e678b00cd4673f45997ad43ffb

    • Size

      1.1MB

    • MD5

      8c07b714152db24201b88b98fa3699d3

    • SHA1

      ed604026ef8d1979c5b827c1e70197eae080e697

    • SHA256

      b00e9bbd3ba1de3017b76d9de53f859c69c358e678b00cd4673f45997ad43ffb

    • SHA512

      53f7b16311fdfe59c43c5a7da1f2a323da3b623c352b65a125d503e47e50b2b1d9dca7ea74df66881e92d3e63feb09183152617eb59674479080ca30ccf3e59d

    • SSDEEP

      24576:RyYhuLKSeflk8h3sHfDXJfUkAZ0zd2tJiDZ5Omz:EKuLPeKrH7WtZ0R2tE15O

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks