General

  • Target

    9e2d86d04cb20e3d5b557cd71115e1145754ca4a10dc32495ef3af9367b6e6cc

  • Size

    1018KB

  • Sample

    231011-lsp91aeg3s

  • MD5

    ca5029e32f9a8de98228ee041075e5d5

  • SHA1

    4f854f0f19afc3695df8c8612e9c8329acccd2b5

  • SHA256

    04596b971b39c0ef3235fa01cf8292bc1c57cc795d1cba5f6df499683e825a2a

  • SHA512

    c8970c33ffc1f43b4b8cfaf5142e424d217ad53eac3fc86abbf7af51935483b86a7add7f8626c5c342499f0f089b4e78e044143496f09b3ad5605e00c07b9317

  • SSDEEP

    24576:OwEP1MyTOajt6jrh6tapo+Uq1V+9xrKdVUUHUHj:5iTHAjtWapoqV+9VKzUUHUD

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
rc4.plain

Targets

    • Target

      9e2d86d04cb20e3d5b557cd71115e1145754ca4a10dc32495ef3af9367b6e6cc

    • Size

      1.0MB

    • MD5

      91746bf540e026d2bc99ebdcb13fdf87

    • SHA1

      faf64c60ba9cfcd3d8371d0032c6321c530f1574

    • SHA256

      9e2d86d04cb20e3d5b557cd71115e1145754ca4a10dc32495ef3af9367b6e6cc

    • SHA512

      7707728d4544e04c405d84aa81b78c6971fd2d5505566dc2a996669fbd465f510fa48a9eb53da6168370900facdd7a28e97baae0b279b3f0e14e634562714214

    • SSDEEP

      12288:BMr0y90NBSICzLqTjfQu6adrOIko6Hr5B8lpHRh48YsqHV9XWCBfcwyxrLp6SK95:VyfSj36adrr6tgpAeq1Vy7xrW7mzuZ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks