General

  • Target

    0ab8a515cdb4712ce3998d283a8823109eb34efe7baff94938f3e60fd9f45b10

  • Size

    1.1MB

  • Sample

    241111-cq4j6stmcq

  • MD5

    39cd5f8cd54bc4cc879b3fe565b38220

  • SHA1

    079ec0f55b38aec6471805e99102e7c9446b83e0

  • SHA256

    0ab8a515cdb4712ce3998d283a8823109eb34efe7baff94938f3e60fd9f45b10

  • SHA512

    7e2bbeda55698aafb5be3c8e2a2e6e2b5faa228d894056c1ed59a6f1f6a51299e334a78944b394901292bf882e4a8e8b1a0e74162002a2f31ee926fe16664969

  • SSDEEP

    24576:wy8IEDHJ0YrxtvEk9Rx6mUPdMA2NPWmOvFUMbA6dFps:3hEDXr/EY1OdM/PWmGA6dT

Malware Config

Extracted

Family

redline

Botnet

maika

C2

185.161.248.75:4132

Attributes
  • auth_value

    33d7e882888973bf73e1c1c697a5cc73

Extracted

Family

amadey

Version

3.81

Botnet

f9a925

C2

http://77.91.124.20

Attributes
  • install_dir

    c3912af058

  • install_file

    oneetx.exe

  • strings_key

    0504ce46646b0dc397a3c30d6692ec75

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

fuga

C2

185.161.248.75:4132

Attributes
  • auth_value

    7c5144ad645deb9fa21680fdaee0d51f

Targets

    • Target

      0ab8a515cdb4712ce3998d283a8823109eb34efe7baff94938f3e60fd9f45b10

    • Size

      1.1MB

    • MD5

      39cd5f8cd54bc4cc879b3fe565b38220

    • SHA1

      079ec0f55b38aec6471805e99102e7c9446b83e0

    • SHA256

      0ab8a515cdb4712ce3998d283a8823109eb34efe7baff94938f3e60fd9f45b10

    • SHA512

      7e2bbeda55698aafb5be3c8e2a2e6e2b5faa228d894056c1ed59a6f1f6a51299e334a78944b394901292bf882e4a8e8b1a0e74162002a2f31ee926fe16664969

    • SSDEEP

      24576:wy8IEDHJ0YrxtvEk9Rx6mUPdMA2NPWmOvFUMbA6dFps:3hEDXr/EY1OdM/PWmGA6dT

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks