General

  • Target

    dfb2da524fce9a959dc3e3f2b9588bf5c235f4abdafb74a2a4693d9d8b751afa

  • Size

    1.5MB

  • Sample

    241106-pmfp6a1akr

  • MD5

    4942a5ccdd49d58550e4884b1801c93c

  • SHA1

    71a45effb1bbf5b454aa19028c8bdd7a47c1f776

  • SHA256

    dfb2da524fce9a959dc3e3f2b9588bf5c235f4abdafb74a2a4693d9d8b751afa

  • SHA512

    161e862c501cdddcf1d2a79623cf0c3e1601cb9cd0a83c174191579c184d104b6641bb750a38bfd8a479ee6a336b6d69b3155cf0ce1b0216668329317b36be25

  • SSDEEP

    24576:/yX7+NK+Akb0oRBtXT3ipz8etZaf8FwWnQVU4Aa8cioqgvW520DrCvRQZ2tjp:KXqNK+AhoRbTSpz8iQfU2VAuixv520D6

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

Botnet

47f88f

C2

http://193.201.9.43

Attributes
  • install_dir

    595f021478

  • install_file

    oneetx.exe

  • strings_key

    4971eddfd380996ae21bea987102e417

  • url_paths

    /plays/chapter/index.php

rc4.plain

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      dfb2da524fce9a959dc3e3f2b9588bf5c235f4abdafb74a2a4693d9d8b751afa

    • Size

      1.5MB

    • MD5

      4942a5ccdd49d58550e4884b1801c93c

    • SHA1

      71a45effb1bbf5b454aa19028c8bdd7a47c1f776

    • SHA256

      dfb2da524fce9a959dc3e3f2b9588bf5c235f4abdafb74a2a4693d9d8b751afa

    • SHA512

      161e862c501cdddcf1d2a79623cf0c3e1601cb9cd0a83c174191579c184d104b6641bb750a38bfd8a479ee6a336b6d69b3155cf0ce1b0216668329317b36be25

    • SSDEEP

      24576:/yX7+NK+Akb0oRBtXT3ipz8etZaf8FwWnQVU4Aa8cioqgvW520DrCvRQZ2tjp:KXqNK+AhoRbTSpz8iQfU2VAuixv520D6

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks