General

  • Target

    15a51c6be5bf6923610a2c6d5287a57916e3674cd5996ccc54a29b857a6017bc

  • Size

    1.3MB

  • Sample

    250110-y6zrtaykbn

  • MD5

    133e056074a6f5b7bddb78acfc918b3e

  • SHA1

    51b19fe344b7ddba77d28a4eb88d9be8ecdb9643

  • SHA256

    15a51c6be5bf6923610a2c6d5287a57916e3674cd5996ccc54a29b857a6017bc

  • SHA512

    fd534a911af47f347c2ac62c70a0b829f3ecadac66026c711f2f97bf93d7b2a38b3f444c4a267804e9cdf6442a632d3df96620e7096eaaaf1aa7da3e6c9f3dc1

  • SSDEEP

    24576:IyhtUH0y/7QMsgCl36kTX7LGf22id+2VQAdbedAyXbDdJbnje3iTQ:P/UH1zYlNTvGf3iA2VjedpdJvkiT

Malware Config

Extracted

Family

amadey

Version

3.70

Botnet

b50502

C2

http://77.91.124.207

Attributes
  • install_dir

    595f021478

  • install_file

    oneetx.exe

  • strings_key

    6e3d32d239380a49b6f83128fe71ea01

  • url_paths

    /plays/chapter/index.php

rc4.plain

Extracted

Family

redline

Botnet

norm

C2

77.91.124.145:4125

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Extracted

Family

redline

Botnet

maxo

C2

77.91.124.145:4125

Attributes
  • auth_value

    44cd1dfc9c943902c043f02a77e4ee3c

Targets

    • Target

      15a51c6be5bf6923610a2c6d5287a57916e3674cd5996ccc54a29b857a6017bc

    • Size

      1.3MB

    • MD5

      133e056074a6f5b7bddb78acfc918b3e

    • SHA1

      51b19fe344b7ddba77d28a4eb88d9be8ecdb9643

    • SHA256

      15a51c6be5bf6923610a2c6d5287a57916e3674cd5996ccc54a29b857a6017bc

    • SHA512

      fd534a911af47f347c2ac62c70a0b829f3ecadac66026c711f2f97bf93d7b2a38b3f444c4a267804e9cdf6442a632d3df96620e7096eaaaf1aa7da3e6c9f3dc1

    • SSDEEP

      24576:IyhtUH0y/7QMsgCl36kTX7LGf22id+2VQAdbedAyXbDdJbnje3iTQ:P/UH1zYlNTvGf3iA2VjedpdJvkiT

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks