Resubmissions

25-09-2024 18:01

240925-wl45pascrh 10

25-09-2024 11:51

240925-nz8q2atdmm 10

General

  • Target

    file.exe

  • Size

    1.9MB

  • Sample

    240925-wl45pascrh

  • MD5

    48d34a4ac51f1a89e010b64fa8cfdcc2

  • SHA1

    ef2a194fbb28562afc735ae4ee74429521ef9105

  • SHA256

    ac848e3af9a5738ef6791dafa2a763a7718c25f1df48a6430827cabe9a5d68f2

  • SHA512

    63fd4531148ca40fa60997692a79e678dcbc032153204cbb591831478aaee70cdde3b7568b8fdae12f995beb84c687bbcf23e094b2fa5e588bb531f0f7a50b28

  • SSDEEP

    49152:Zzuatph4L2H+Ug2sf77jALl77nXmwDdRAbh0SbTPsAEpKE:duqph4L2exT7MB77nXmwI7cF

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Targets

    • Target

      file.exe

    • Size

      1.9MB

    • MD5

      48d34a4ac51f1a89e010b64fa8cfdcc2

    • SHA1

      ef2a194fbb28562afc735ae4ee74429521ef9105

    • SHA256

      ac848e3af9a5738ef6791dafa2a763a7718c25f1df48a6430827cabe9a5d68f2

    • SHA512

      63fd4531148ca40fa60997692a79e678dcbc032153204cbb591831478aaee70cdde3b7568b8fdae12f995beb84c687bbcf23e094b2fa5e588bb531f0f7a50b28

    • SSDEEP

      49152:Zzuatph4L2H+Ug2sf77jALl77nXmwDdRAbh0SbTPsAEpKE:duqph4L2exT7MB77nXmwI7cF

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks