General

  • Target

    7d7577ee380ae5a106ba1294afe1f2589ba7f4f3a320ba4b5921b5ed2fb7bae4

  • Size

    1.0MB

  • Sample

    231011-rk5bvace8s

  • MD5

    76ef62338ac7fa2097c3c6bc9125a51a

  • SHA1

    ab048c616e85613ed0fe906f05985ddf39712e08

  • SHA256

    c6ab92a9f2f113ddbac4b1e54890bd69fc85bb2bb1eb65240009e5e103ef9a55

  • SHA512

    58d757fdf64f1c48b303a4df54998a72ca55f0864855637d1840cc7d2f8c1e85312bfdcba4da73cf4e3c3aba96b69ae0f39aacd35448a0fe7557a98566ce326e

  • SSDEEP

    24576:97PyJPZZMc4LL7WD0XQQqoACLEhb2fqt2IiiFWWhs2LC8:laJPZN4LL7WDqzqo7Yp0A2Ii3+sSC8

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

amadey

Version

3.89

C2

http://77.91.68.52/mac/index.php

http://77.91.68.78/help/index.php

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

rc4.plain
rc4.plain

Targets

    • Target

      7d7577ee380ae5a106ba1294afe1f2589ba7f4f3a320ba4b5921b5ed2fb7bae4

    • Size

      1.1MB

    • MD5

      a79dbf0864fd161889fc880435032f96

    • SHA1

      2c7446a3671a19f946453c46c13fb093e0a9f369

    • SHA256

      7d7577ee380ae5a106ba1294afe1f2589ba7f4f3a320ba4b5921b5ed2fb7bae4

    • SHA512

      2e8edc2b1b0e3d2d232ac3473a03a687469453c7989f0c12c3fe08dd7062183d29024e605e122d254774e94af58b49482ff18a1c015aeb580b889d670e01cdba

    • SSDEEP

      24576:4yelM4L+LJmD4XQ8qyA+dS/5Sj+t2IEiDw6hsa:/ei4LCmD2DqypQRys2IEZys

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Mystic stealer payload

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks