General

  • Target

    2803937df74ff955b345d5a8763849f21140eec0a19e8a64d7b5bcbab221dc02

  • Size

    1.5MB

  • Sample

    241106-nera9ayhpf

  • MD5

    04896e5d1ae560eed3d91fea22c27733

  • SHA1

    dca37d0d5d329419cc6af349faa93fafd28a936e

  • SHA256

    2803937df74ff955b345d5a8763849f21140eec0a19e8a64d7b5bcbab221dc02

  • SHA512

    9b113e4a4bd2434f2b3b66af0cfd42757f300655fb691d453b13c0332837d2630dac55b40034d2c4d149d5ea0a9b2f3c43656b4672339ba35162994e3adae3e0

  • SSDEEP

    24576:gylr5+niWFSJ6PWBtUZIp2qatuuT9Xr51CgHP1D9TLJlq/HjXkdLhkw3WX:nlrIiWrOBtZyTt/HP1BXHykFF3

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

Botnet

47f88f

C2

http://193.201.9.43

Attributes
  • install_dir

    595f021478

  • install_file

    oneetx.exe

  • strings_key

    4971eddfd380996ae21bea987102e417

  • url_paths

    /plays/chapter/index.php

rc4.plain

Extracted

Family

redline

Botnet

masi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6e26457e57602c4cf35356c36d8dd8e8

Targets

    • Target

      2803937df74ff955b345d5a8763849f21140eec0a19e8a64d7b5bcbab221dc02

    • Size

      1.5MB

    • MD5

      04896e5d1ae560eed3d91fea22c27733

    • SHA1

      dca37d0d5d329419cc6af349faa93fafd28a936e

    • SHA256

      2803937df74ff955b345d5a8763849f21140eec0a19e8a64d7b5bcbab221dc02

    • SHA512

      9b113e4a4bd2434f2b3b66af0cfd42757f300655fb691d453b13c0332837d2630dac55b40034d2c4d149d5ea0a9b2f3c43656b4672339ba35162994e3adae3e0

    • SSDEEP

      24576:gylr5+niWFSJ6PWBtUZIp2qatuuT9Xr51CgHP1D9TLJlq/HjXkdLhkw3WX:nlrIiWrOBtZyTt/HP1BXHykFF3

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks