General

  • Target

    1719144343.4971163_setup.exe

  • Size

    4.2MB

  • Sample

    240623-n9sgsszbqa

  • MD5

    14ea2d3bc269e40b18a2aa666ab76657

  • SHA1

    cfc76c1c7b59f73c6993c7d6ce27695548a5103a

  • SHA256

    4910e71622b68423135272ee46b7d44dde2edddb4b3dddcb419a6ea97f89efd6

  • SHA512

    1f24e46f46f51be96a00be3e14f191381ab03c10a7c28dea85a9703d17891b526ea97a485cebc1a19ee9b5b268a705fe38a71d7c10a5d5fb461483ed935022a5

  • SSDEEP

    98304:CHWm2BjolNxBrO7gOxpnTDYTNnD+yEZ6mhgKfS1GrI44:K6BjohBrQgvTNqSm2ES1GrI4

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.92:27953

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Targets

    • Target

      1719144343.4971163_setup.exe

    • Size

      4.2MB

    • MD5

      14ea2d3bc269e40b18a2aa666ab76657

    • SHA1

      cfc76c1c7b59f73c6993c7d6ce27695548a5103a

    • SHA256

      4910e71622b68423135272ee46b7d44dde2edddb4b3dddcb419a6ea97f89efd6

    • SHA512

      1f24e46f46f51be96a00be3e14f191381ab03c10a7c28dea85a9703d17891b526ea97a485cebc1a19ee9b5b268a705fe38a71d7c10a5d5fb461483ed935022a5

    • SSDEEP

      98304:CHWm2BjolNxBrO7gOxpnTDYTNnD+yEZ6mhgKfS1GrI44:K6BjohBrQgvTNqSm2ES1GrI4

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies firewall policy service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks