General

  • Target

    b6bf3847876a16cab6e7670d0373483f04350abe949f33b2cbcceb14fa122419

  • Size

    3.7MB

  • Sample

    240105-ywzztshgbl

  • MD5

    46168b89d46f9e9a0159cc5eca37ac9b

  • SHA1

    515a4e73d7e035bfcfcdfe727c1c7cb4d2a72c97

  • SHA256

    b6bf3847876a16cab6e7670d0373483f04350abe949f33b2cbcceb14fa122419

  • SHA512

    3d74a0e4617e4bb098cda2eff24a24c905c770b28b0d704cdf670cc1128ec0d83c0ee3b5685ecf24f14a8ad70b1a0edc7d70abbbb013bc706102680a081548b6

  • SSDEEP

    98304:qKJhAxx9h2FvwBP/6BcjIHrbdrIfBoaQ9Pcx:q1f9UEo0IHlrIf+aoC

Malware Config

Extracted

Family

amadey

Version

4.15

C2

http://185.215.113.68

Attributes
  • install_dir

    d887ceb89d

  • install_file

    explorhe.exe

  • strings_key

    7cadc181267fafff9df8503e730d60e1

  • url_paths

    /theme/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTrafic

C2

20.79.30.95:13856

Extracted

Family

redline

Botnet

@Pixelive

C2

195.20.16.103:20440

Extracted

Family

redline

Botnet

Legaa

C2

185.172.128.33:38294

Targets

    • Target

      b6bf3847876a16cab6e7670d0373483f04350abe949f33b2cbcceb14fa122419

    • Size

      3.7MB

    • MD5

      46168b89d46f9e9a0159cc5eca37ac9b

    • SHA1

      515a4e73d7e035bfcfcdfe727c1c7cb4d2a72c97

    • SHA256

      b6bf3847876a16cab6e7670d0373483f04350abe949f33b2cbcceb14fa122419

    • SHA512

      3d74a0e4617e4bb098cda2eff24a24c905c770b28b0d704cdf670cc1128ec0d83c0ee3b5685ecf24f14a8ad70b1a0edc7d70abbbb013bc706102680a081548b6

    • SSDEEP

      98304:qKJhAxx9h2FvwBP/6BcjIHrbdrIfBoaQ9Pcx:q1f9UEo0IHlrIf+aoC

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detected google phishing page

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

5
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks