General

  • Target

    8a5f48be7e02ee11ea76e5ac79526b55ce21bb9882a77cc675ef6c49b7761b6c

  • Size

    1.5MB

  • Sample

    241030-1agx8s1gna

  • MD5

    32fa15129746f512d362c7f5cd8bb01f

  • SHA1

    fb09e8f713723925f6fe51f3cf00987c03535cf1

  • SHA256

    8a5f48be7e02ee11ea76e5ac79526b55ce21bb9882a77cc675ef6c49b7761b6c

  • SHA512

    321b2a9400f9ad7a978c67e92e2a1aa72c722c2840b19a3441d3ebd9585573c97c1da749b0d246db621f7ca44427fe810ab735acc524a34b5819a68e3d7b86ec

  • SSDEEP

    24576:Fys5oqnd8WNvAYPjse52nXzk8DaIrBmHDt9c+1EV/qVjUMyNknk9NPsjDpvGx:gO/dGajsZnXYfABgfc+W/qFn6NP6G

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

Botnet

47f88f

C2

http://193.201.9.43

Attributes
  • install_dir

    595f021478

  • install_file

    oneetx.exe

  • strings_key

    4971eddfd380996ae21bea987102e417

  • url_paths

    /plays/chapter/index.php

rc4.plain

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      8a5f48be7e02ee11ea76e5ac79526b55ce21bb9882a77cc675ef6c49b7761b6c

    • Size

      1.5MB

    • MD5

      32fa15129746f512d362c7f5cd8bb01f

    • SHA1

      fb09e8f713723925f6fe51f3cf00987c03535cf1

    • SHA256

      8a5f48be7e02ee11ea76e5ac79526b55ce21bb9882a77cc675ef6c49b7761b6c

    • SHA512

      321b2a9400f9ad7a978c67e92e2a1aa72c722c2840b19a3441d3ebd9585573c97c1da749b0d246db621f7ca44427fe810ab735acc524a34b5819a68e3d7b86ec

    • SSDEEP

      24576:Fys5oqnd8WNvAYPjse52nXzk8DaIrBmHDt9c+1EV/qVjUMyNknk9NPsjDpvGx:gO/dGajsZnXYfABgfc+W/qFn6NP6G

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks