General

  • Target

    f506a83685bb87c1fbb0afb5aad9b0f359edfa24a3128e0705be15e62b6c1907

  • Size

    1.3MB

  • Sample

    231011-hrkrcaae35

  • MD5

    b8d4e02578e50e8326254b7d72299ad7

  • SHA1

    e0923817130239bec53a4a58ad2c4ea33f74d52c

  • SHA256

    0c3631b9f986f489295f1ce99b7088aa43a63280477eb0128a6849da8ee66ace

  • SHA512

    086585f0ce5181b41a9971f1eacde186990cfcd09ce57cfbaab76814f14e977bd52e1bfb45eb6117aed3811d6b144ee9c4b342089170299443e9d58ed304750a

  • SSDEEP

    24576:eyQQP6N2kPnc4kmV1AxMCbFzfBswvmD/bGAztqwLUzLK3bSUjb1a+Bv2LHQ:tQQ0Pc4kmV1xCbFlswvF4gLwSSsM6Q

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
rc4.plain

Targets

    • Target

      f506a83685bb87c1fbb0afb5aad9b0f359edfa24a3128e0705be15e62b6c1907

    • Size

      1.3MB

    • MD5

      6066a5520bb75443eee8c1aab00e3d22

    • SHA1

      75714d7e8bfacf59d63f5a1fa124e17f1533df79

    • SHA256

      f506a83685bb87c1fbb0afb5aad9b0f359edfa24a3128e0705be15e62b6c1907

    • SHA512

      d7bea42d272a30d40a969b7dffe96c524c62d538f15e4165e9862dc471f9d27fb0c6e099f279dc8c36386ba7afc514e0e8de343c8b980c7ae878ad7aa10a3622

    • SSDEEP

      24576:MyrIP8N6aRPnW4HTVNAxoCLFzfhsgvmD/lYAztq4XUNLKdpZdCXeqzYBf2LPeFW:7rIfGPW4HTVN1CLFNsgv524L8pr+0c

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks