General

  • Target

    b2b1d1443477c4516046b9a19b6147589b85a786db9f3adab66bdcd801194b35

  • Size

    1019KB

  • Sample

    231011-ls824seg6s

  • MD5

    5d35407c0a050d48c1655a22f9959339

  • SHA1

    87e365bf7a1fe8080e912cc179c784edb1146364

  • SHA256

    ff5a345e66395da78acaf57882a5838048190d45a2131451e74f4442f2e396b2

  • SHA512

    0822a8e5f47415ebf33ae663d63ba10b9d647f8fbcc4365be88324eaf0842949cf242c03f12cd9a829857ef8daa38df14475cb052551d70448b83a81a644a75f

  • SSDEEP

    24576:l763WynYObKK3D9g9BV5q0euecxxabkLTeTa4z:lwnYObKASygNTeTR

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
rc4.plain

Targets

    • Target

      b2b1d1443477c4516046b9a19b6147589b85a786db9f3adab66bdcd801194b35

    • Size

      1.0MB

    • MD5

      75280d4148aaa0ad2db420c5053dac86

    • SHA1

      94d49a37a32719aed5051735dec84da8bcf1c74c

    • SHA256

      b2b1d1443477c4516046b9a19b6147589b85a786db9f3adab66bdcd801194b35

    • SHA512

      36cd2f88bcde1202dd21b918800456beaf940ab9cb7c8c52745c2923f52454df463731ae7247da564a2ebe2b1d7cc4a42587c0c7439161d92da26f7cd2139246

    • SSDEEP

      24576:fy/OFKK9D8fgLBV7w0euhDxaFknbzTa0K:q/OFKu8Y8m5XT

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks