General

  • Target

    996d549b56332fa4af00ccecb68b47aaf63ec2db1e199523ecf638120779f76b

  • Size

    103KB

  • Sample

    231011-rhtsbscd4w

  • MD5

    6401c31a3fc8bceb296de06e37bddba3

  • SHA1

    a2febfdda167c1dd23e8e94e049072394dce9154

  • SHA256

    a0621c418325443bb35ac32f568769acee45be2c650fe45bea5d4cb50246c89b

  • SHA512

    f9e4f8ea8694e0a2a5e1c8e03987988251e55bc9eb01a704d8e645291d12df2acfebd8dcdef631a603d51a51d579e3cbb0550611f435f40e21917c4a08687f19

  • SSDEEP

    3072:vLTzrHEDjomznpCacXyS+ZLRyy401G6JPb:vLXmD8hX8ZNyqG6Bb

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Targets

    • Target

      996d549b56332fa4af00ccecb68b47aaf63ec2db1e199523ecf638120779f76b

    • Size

      239KB

    • MD5

      8225efe7d368280f7ea6f2c0a34dd153

    • SHA1

      76ab50a26df49fc5f99c43f7d91766e5576c7930

    • SHA256

      996d549b56332fa4af00ccecb68b47aaf63ec2db1e199523ecf638120779f76b

    • SHA512

      a4571196fba4472b55116ef5a340303b1d2376651ccbc75885b0d085fdc757c1157f93ffecfda704834641bb5979a19b3a0dae62ea2c2b848d653aa34848d214

    • SSDEEP

      6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detected google phishing page

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks