General

  • Target

    98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a

  • Size

    1.3MB

  • Sample

    231011-hp35xagb9w

  • MD5

    649748d7e1a6f8666cd55246d17bff7f

  • SHA1

    daf05cdd70abb59005b5876f7a3f6f31a54bfb37

  • SHA256

    e1280ea9c88ea337310a454efef1a59ecada7b182c693f1f67536f0fcf836382

  • SHA512

    6a87717fa2e4e76f818f69651fec3f8ad6f32bb1b94ed10a604c9878c1e0b4b696f15f4a67adf64f3cddc85362a44c53feecc65ec0e0e196711ac81f91272697

  • SSDEEP

    24576:I0yujnfenKKYPJCWciUR5/krnh1jL/dtHpLISJ81EXsvcaL4RY:eujfenKKwvqUh1jJt5AuGce46

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
rc4.plain

Targets

    • Target

      98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a

    • Size

      1.3MB

    • MD5

      0ac444968903762d7eaafb0f01e85266

    • SHA1

      f60908de0913fe94dcf94376d1822faae76e638f

    • SHA256

      98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a

    • SHA512

      26dcf79f0c23bfc3affdb40dd78c53286d387bb132d929b6bb9845dfbddb9514675c2f637fec722b01352dc89dc9bbb6dc22e7fc5708e25327c055dc7ead81a1

    • SSDEEP

      24576:/ykqkte0wKSPTAW2gUhd/krnX1jESEdhpDISSFtMdEX6hOIaL4dwC/0:KkqseZKOPAUX1jPy3YYWwBW42W

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks