General

  • Target

    cdfb958464687685aa20ef88be643ae77320411f1d5dc8b71abdd44959e90551

  • Size

    1016KB

  • Sample

    231011-lbpbdadf2w

  • MD5

    0f9f7645e7cc9e9b80b15401d14970e3

  • SHA1

    7848be0627a7df4feff3e403721c222fae3e464d

  • SHA256

    dc70bc402407f077865ca23196b60b320876ce4e3037de774b22ea7d8f18e8f2

  • SHA512

    ebd9979976e223eeb4d1a35db0702d77d76b4a08f75d361399c7f8817430413952752d653d4679d67da2ee456af96287efd3a1093a521bdab303cbbdf0c74f1c

  • SSDEEP

    24576:eJlyyLaG0Dt0aeNwbJg0sAWiZ0OEKJWqhxvKVKh7v:lyLaBBDpg0szBVqhxn7v

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
rc4.plain

Targets

    • Target

      cdfb958464687685aa20ef88be643ae77320411f1d5dc8b71abdd44959e90551

    • Size

      1.0MB

    • MD5

      aafe88fe1b886a4691eee43eda1a52df

    • SHA1

      327a1c8e2be8d109578c223e6bfff0f28bee3923

    • SHA256

      cdfb958464687685aa20ef88be643ae77320411f1d5dc8b71abdd44959e90551

    • SHA512

      cac01f4697802e3c9960ad7ce6abfdd5213e8c07fadd2b4e42103f1f9c2849eb88e3ad91beb0ed592b4afc7e1229f45d9f1f3c58a0bad9e2dfd78caea6bc4e7e

    • SSDEEP

      24576:Xy4LmI0DR2a4XwbJgws0WaeIUK1WnWYxvKVmIGT:i4LmRNZzgwsXfp9xCG

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks