General

  • Target

    a8b0aa22c3ffbb530df1728439ba251a34ce70253fe090ae6dd95ac4a14e0409.exe

  • Size

    1.1MB

  • Sample

    241118-25x4daxhpq

  • MD5

    318b4c1acd9b260764f6fc0d6e097230

  • SHA1

    80c26718f2a6fa082dff9f07fc897b03176e6ccc

  • SHA256

    a8b0aa22c3ffbb530df1728439ba251a34ce70253fe090ae6dd95ac4a14e0409

  • SHA512

    dca6b10e67b75248ca8eaf65ac0ad1b6eefdb2a6333627cf4765acdaa2cd6ea031b2d59e9e0418a2c475f781317726ce344e59f311938610d60f9a4a736e6563

  • SSDEEP

    24576:0yigj1BmLrEl5fUyMqYWAepSSydarz5mmOF70sfMEhUvf:D1HmLeaiQShz5uF70skEa3

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

amadey

Version

3.70

Botnet

47f88f

C2

http://193.201.9.43

Attributes
  • install_dir

    595f021478

  • install_file

    oneetx.exe

  • strings_key

    4971eddfd380996ae21bea987102e417

  • url_paths

    /plays/chapter/index.php

rc4.plain

Extracted

Family

redline

Botnet

maxi

C2

185.161.248.90:4125

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      a8b0aa22c3ffbb530df1728439ba251a34ce70253fe090ae6dd95ac4a14e0409.exe

    • Size

      1.1MB

    • MD5

      318b4c1acd9b260764f6fc0d6e097230

    • SHA1

      80c26718f2a6fa082dff9f07fc897b03176e6ccc

    • SHA256

      a8b0aa22c3ffbb530df1728439ba251a34ce70253fe090ae6dd95ac4a14e0409

    • SHA512

      dca6b10e67b75248ca8eaf65ac0ad1b6eefdb2a6333627cf4765acdaa2cd6ea031b2d59e9e0418a2c475f781317726ce344e59f311938610d60f9a4a736e6563

    • SSDEEP

      24576:0yigj1BmLrEl5fUyMqYWAepSSydarz5mmOF70sfMEhUvf:D1HmLeaiQShz5uF70skEa3

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks