General

  • Target

    033a58da23f541292cd011b98a8cd621a4230c9f86d6d731537b893ee1e3cfafN

  • Size

    456KB

  • Sample

    241104-rfj54stldk

  • MD5

    bfd492a1859477f0e0ad10de1f1a3150

  • SHA1

    46b076da179595cf50136a866694b49cbb9988f2

  • SHA256

    033a58da23f541292cd011b98a8cd621a4230c9f86d6d731537b893ee1e3cfaf

  • SHA512

    24f4d7f190d269cdb043ecc303bbef483d88f0a12a47a9d6e03f6554f105443a6af2c00a5abd17a787e5128b917d266e67b23b57ace073da37000ffa9fe2aea5

  • SSDEEP

    12288:bMr1y90xYjUbgQy0kgHq3FazVCXSTljWvXeY:KyuV1/3I46ShOOY

Malware Config

Extracted

Family

amadey

Version

3.89

Botnet

fb0fb8

C2

http://77.91.68.52

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explonde.exe

  • strings_key

    916aae73606d7a9e02a1d3b47c199688

  • url_paths

    /mac/index.php

rc4.plain

Extracted

Family

redline

Botnet

jokes

C2

77.91.124.82:19071

Attributes
  • auth_value

    fb7b36b70ae30fb2b72f789037350cdb

Targets

    • Target

      033a58da23f541292cd011b98a8cd621a4230c9f86d6d731537b893ee1e3cfafN

    • Size

      456KB

    • MD5

      bfd492a1859477f0e0ad10de1f1a3150

    • SHA1

      46b076da179595cf50136a866694b49cbb9988f2

    • SHA256

      033a58da23f541292cd011b98a8cd621a4230c9f86d6d731537b893ee1e3cfaf

    • SHA512

      24f4d7f190d269cdb043ecc303bbef483d88f0a12a47a9d6e03f6554f105443a6af2c00a5abd17a787e5128b917d266e67b23b57ace073da37000ffa9fe2aea5

    • SSDEEP

      12288:bMr1y90xYjUbgQy0kgHq3FazVCXSTljWvXeY:KyuV1/3I46ShOOY

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks