General

  • Target

    5739c862947a8486ab2ec1b15ea5d4e66ffb63e8c6d5049ff1fca75b4e938d40

  • Size

    1.1MB

  • Sample

    231011-rcca4abf51

  • MD5

    6a5c4d384e0127ed7ec925a106d2fb04

  • SHA1

    5b0d241245617c0cebbb76d7a438ea19c9073a6f

  • SHA256

    5739c862947a8486ab2ec1b15ea5d4e66ffb63e8c6d5049ff1fca75b4e938d40

  • SHA512

    0a7ffec7266b11b23f6915812260d95550b32d9cd9ca8311dbe5fce352733b1af910b1fd1a1cbb6c925bbb238c5d4ee3ac560db92c72d46cc07f2ef8398efdcc

  • SSDEEP

    12288:AMr2y90gxzNdKEA7jfgZTbJTrScJo9q9Wg+4Iiy492mEP3OR3jOTlJyLe2BuUDpo:myRxA7sZTbZ2QmTUe2B5WbhUXE+S66

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
rc4.plain

Targets

    • Target

      5739c862947a8486ab2ec1b15ea5d4e66ffb63e8c6d5049ff1fca75b4e938d40

    • Size

      1.1MB

    • MD5

      6a5c4d384e0127ed7ec925a106d2fb04

    • SHA1

      5b0d241245617c0cebbb76d7a438ea19c9073a6f

    • SHA256

      5739c862947a8486ab2ec1b15ea5d4e66ffb63e8c6d5049ff1fca75b4e938d40

    • SHA512

      0a7ffec7266b11b23f6915812260d95550b32d9cd9ca8311dbe5fce352733b1af910b1fd1a1cbb6c925bbb238c5d4ee3ac560db92c72d46cc07f2ef8398efdcc

    • SSDEEP

      12288:AMr2y90gxzNdKEA7jfgZTbJTrScJo9q9Wg+4Iiy492mEP3OR3jOTlJyLe2BuUDpo:myRxA7sZTbZ2QmTUe2B5WbhUXE+S66

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks