General

  • Target

    AXEchecker.exe

  • Size

    17.5MB

  • Sample

    241229-kx9nrsxqes

  • MD5

    344abea4873a59faba12359e41f2001a

  • SHA1

    2fb4bdc94fdb5318fe33a9810af081b854d734ef

  • SHA256

    0f3f397fcac98792bdd64d7b005426561b853b651cd8581d88c329ba042e35da

  • SHA512

    e742199db63940f085f036f147f3f709d9b67ce6fde2b95da83dcc442921a44d80536d5e220449946eb9728c9a7a3cf3b96df4251733e763304af9570618531c

  • SSDEEP

    393216:3EkeCaLJwq3Obs2CluXMCHWUjkjx5WsqWxTA88eP8DLbLsXxIP:3GCaLJwq3ObRquXMb8DsqA2p/bLuiP

Malware Config

Extracted

Family

amadey

Version

5.10

Botnet

0f3be6

C2

http://185.81.68.147

http://185.81.68.148

Attributes
  • install_dir

    ee29ea508b

  • install_file

    Gxtuum.exe

  • strings_key

    d3a5912ea69ad34a2387af70c8be9e21

  • url_paths

    /7vhfjke3/index.php

    /8Fvu5jh4DbS/index.php

rc4.plain

Extracted

Family

redline

Botnet

FJCX

C2

185.81.68.147:1912

Targets

    • Target

      AXEchecker.exe

    • Size

      17.5MB

    • MD5

      344abea4873a59faba12359e41f2001a

    • SHA1

      2fb4bdc94fdb5318fe33a9810af081b854d734ef

    • SHA256

      0f3f397fcac98792bdd64d7b005426561b853b651cd8581d88c329ba042e35da

    • SHA512

      e742199db63940f085f036f147f3f709d9b67ce6fde2b95da83dcc442921a44d80536d5e220449946eb9728c9a7a3cf3b96df4251733e763304af9570618531c

    • SSDEEP

      393216:3EkeCaLJwq3Obs2CluXMCHWUjkjx5WsqWxTA88eP8DLbLsXxIP:3GCaLJwq3ObRquXMb8DsqA2p/bLuiP

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks