General

  • Target

    f778e45798fced808f59586f5b2fd318.exe

  • Size

    1.1MB

  • Sample

    231011-fly1nsag7v

  • MD5

    f778e45798fced808f59586f5b2fd318

  • SHA1

    b1f8326164d70ed9ec38a13486e7ef6046e83585

  • SHA256

    5c30d6858f3c17f6007ba87a11b0fc948ecebd18394d704dd7c282fea9686e0d

  • SHA512

    d98f19d44cd7c1f575a1b9b10eb3a4152072432f8343db515c5fbc86131f74b71cf402ac64bd645664ea0eacfeea3084c61184d0b84c295f97b3806e8da4a0d5

  • SSDEEP

    24576:ryNHc+hT7YZkFnMju5N18ZuuHwbHUDk5FJoA58:e+87dFnvfeeHUI/GA

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1/theme/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

rc4.plain
rc4.plain

Targets

    • Target

      f778e45798fced808f59586f5b2fd318.exe

    • Size

      1.1MB

    • MD5

      f778e45798fced808f59586f5b2fd318

    • SHA1

      b1f8326164d70ed9ec38a13486e7ef6046e83585

    • SHA256

      5c30d6858f3c17f6007ba87a11b0fc948ecebd18394d704dd7c282fea9686e0d

    • SHA512

      d98f19d44cd7c1f575a1b9b10eb3a4152072432f8343db515c5fbc86131f74b71cf402ac64bd645664ea0eacfeea3084c61184d0b84c295f97b3806e8da4a0d5

    • SSDEEP

      24576:ryNHc+hT7YZkFnMju5N18ZuuHwbHUDk5FJoA58:e+87dFnvfeeHUI/GA

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks